Patent application number | Description | Published |
20130254758 | Application Construction for Execution on Diverse Computing Infrastructures - Example systems and methods of application construction for execution on diverse computing infrastructures are presented. In one example, an application descriptor comprising information regarding an application is received. Available computing machine resources for execution of the application are selected based on the information in the application descriptor. Software resources comprising the application are installed on the selected computing machine resources based on the information in the application descriptor. At least one of the selected computing machine resources and the installed software resources are configured for execution of the application based on the information in the application descriptor. | 09-26-2013 |
20130326487 | EMULATING CLOUD FUNCTIONING OF APPLICATIONS LOCALLY - In one aspect, an application is received to be to be executed in a local development environment. The application is configured to access at least one service from a number of services of a remote runtime platform. A software development kit (SDK) is selected as an execution environment of the application. The SDK includes a number of application programming interfaces (APIs) of the services and a number of local implementations of the services. In another aspect, the application is executed over the SDK and remote functioning of the application is emulated in the local development environment. | 12-05-2013 |
20150020164 | AUTOMATIC MANAGEMENT OF SECURE CONNECTIONS - In an example embodiment, on-premise systems have access to a cloud connector located on-premise. When the on-premise cloud connector is started, it may establish a secure connection to a notification service residing in the cloud. Applications running on the cloud have access to a connectivity agent. Cloud applications wishing to communicate with the on-premise systems send the communications through the connectivity agent. If a secure connection between the connectivity agent and the cloud connector does not exist, the connectivity agent sends a request to open a secure connection to the notification service. The notification service forwards the request to the cloud connector over its secure connection. The cloud connector may check the requested connection, and if authorized, open a secure connection to the connectivity agent. The connectivity agent then forwards the communication to the cloud connector, which then forwards it to the on-premise system. | 01-15-2015 |
Patent application number | Description | Published |
20090282196 | FIRST IN FIRST OUT EVICTION IMPLEMENTATION - Methods for a treatment of cached objects are described. In one embodiment, management of a region of a cache is configured with an eviction policy plug-in. The eviction policy plug-in includes an eviction timing component and a sorting component, with the eviction timing component including code to implement an eviction timing method, and the eviction timing method to trigger eviction of an object from the region of cache. The sorting component includes code to implement a sorting method to identify an object that is eligible for eviction in the region of cache. The sorting method involves identifying an object that has been cached in the region of cache for a longer time period than other objects that are cached in the cache region. | 11-12-2009 |
20090282395 | COMMON CLASS LOADERS - Embodiments include a system for loading components with complex intra-dependencies. Components in the system may be assigned at start up to a common loader module. The system detects reference cycles amongst the set of components in the system. All components in a reference cycle may be assigned for loading to the same common loader. This system avoids deadlock scenarios by identifying reference cycles at start up and assigning each cycle to a single common loader. The embodiments of the system also analyze components to be loaded that are identified after start up to determine if they cause a new reference cycle. Components that cause a new reference cycle may not be allowed to be loaded to prevent deadlock loading scenarios. | 11-12-2009 |
20100268881 | CACHE REGION CONCEPT - A method to associate a storage policy with a cache region is disclosed. In this method, a cache region associated with an application is created. The application runs on virtual machines, and where a first virtual machine has a local memory cache that is private to the first virtual machine. The first virtual machine additionally has a shared memory cache that is shared by the first virtual machine and a second virtual machine. Additionally, the cache region is associated with a storage policy. Here, the storage policy specifies that a first copy of an object to be stored in the cache region is to be stored in the local memory cache and that a second copy of the object to be stored in the cache region is to be stored in the shared memory cache. | 10-21-2010 |
20140156938 | CACHE REGION CONCEPT - A method to store objects in a memory cache is disclosed. A request is received from an application to store an object in a memory cache associated with the application. The object is stored in a cache region of the memory cache based on an identification that the object has no potential for storage in a shared memory cache and a determination that the cache region is associated with a storage policy that specifies that objects to be stored in the cache region are to be stored in a local memory cache and that a garbage collector is not to remove objects stored in the cache region from the local memory cache. | 06-05-2014 |