Patent application number | Description | Published |
20110179133 | CONNECTION MANAGER CAPABLE OF SUPPORTING BOTH DISTRIBUTED COMPUTING SESSIONS AND NON DISTRIBUTED COMPUTING SESSIONS - A method is described that involves establishing a connection over a shared memory between a connection manager and a worker node. The shared memory is accessible to multiple worker nodes. Then sending, from the connection manager to the worker node over the connection, a first request containing a method call to a remote object on the worker node. Also sending, from the connection manager to the worker node over the connection, a second request containing a second method call to a second remote object on the worker node. | 07-21-2011 |
20120296961 | SESSION MANAGEMENT WITHIN A MULTI-TIERED ENTERPRISE NETWORK - A system and method are described in which session objects are organized and managed within a structured hierarchy of session object storage units, referred to herein as “session domains.” In an example, a method can include generating a plurality of session objects, defining a plurality of session domains, associating the plurality of session objects with the plurality of session domains, identifying related session domains, and organizing the related session domains within one of a plurality of hierarchy levels. The session objects can store session data defining a state of interaction with clients. The session domains can provide abstract storage for session objects having similar management characteristics. The related session domains can be grouped in hierarchy levels based on one or more related management characteristics of the session objects. | 11-22-2012 |
20130246458 | File Repository Abstraction Layer - Example systems and methods of implementing an abstraction layer for a file repository are presented. In one example, an access request to retrieve an electronic file is received from a requesting device. The request includes an identification of a first storage location in the file repository. In response to the request, the first storage location of the file repository is searched for the electronic file. If the search is successful, the electronic file is retrieved from the file repository at the first storage location. If the search is unsuccessful, a redirection file is accessed in the file repository. The redirection file includes an identification of a second storage location for the electronic, file at a storage site external to the file repository. The electronic file is retrieved from the storage site based on the indication of the second storage location. The retrieved file is transmitted to the requesting device. | 09-19-2013 |
20130246622 | File Access Using Counter Locking Mechanism - In an embodiment, a method is provided for accessing a file node. In this method, file access request specifying a file node to be accessed by way of a file system is received at a server from a client device. A counter is referenced to identify that the file node is being accessed in response to a different file access request. The counter is configured to track whether the file node is being accessed. The file node is provided to the client device when the counter indicates a termination of access to the file node resulting from the different file access request. | 09-19-2013 |
20130254755 | DYNAMICALLY UPDATING ON-DEMAND RUNTIME PLATFORMS EXECUTING BUSINESS APPLICATIONS - In one aspect, a business application is provided by a customer for execution in a cloud environment. A runtime platform for the business application is identified based on the functionality of the business application. In another aspect, an installable package for a product composing the business application and a first version of the runtime platform is generated. In yet another aspect, the business application and a second version of the runtime platform are synchronously installed in a cloud environment based on the installable package of the product, where the metadata of the business application and the metadata of the business application are dynamically validated prior the installation to guarantee compatibility. | 09-26-2013 |
20130254757 | NESTING INSTALLATIONS OF SOFTWARE PRODUCTS - In one aspect, a new software application building upon a base software product is created. A definition of a new software product is generated including the new software application. A reference to the base software product is included in the definition of the new software product. In another aspect, an installable package for the new software product is generated based on the definition and stored in a public repository. In yet another aspect, the installable package of the new software product includes a reference to an installable package of the base software product to enable customers installing the new software product with nesting an installation of the base software product. | 09-26-2013 |
20130275623 | DEPLOYMENT OF WEB APPLICATION ARCHIVES AS A PREPROCESSING STEP FOR PROVISIONING - In one aspect, a transformation of web application archives (WARs) to Open Services Gateway initiative (OSGi™) web bundles is performed. WARs are specialized Java® archives for packaging web applications and the transformation to OSGi™ web bundles is realized by applying proper entries to the manifest of the WARs thus making them OSGi™ compliant. In another aspect, the transformed WARs to OSGi™ web bundles are marked as auto started so that the web application is available for requests after product installation. | 10-17-2013 |
20130275958 | AUTOMATIC IDENTIFICATION OF SERVICES - In one aspect, a metadata of an application is received. The metadata describes a number of artifacts of the computer application. Based on a reference in the application metadata, at least one service that the application is configured to access is determined. In another aspect, additional metadata describing artifacts associated with the at least one service are identified. The artifacts associated with the at least one service and the artifacts of the computer application are selected for installation of the computer application. | 10-17-2013 |
20130275960 | VALIDATION OF CURRENT STATES OF PROVISIONED SOFTWARE PRODUCTS IN A CLOUD ENVIRONMENT - In one aspect, a state file is received that describes a desired state of a provisioned software product started in a cloud environment. The state file defines the bundles to be installed and their desired state. The desired states of the bundles are read from the state file. Currently installed bundles, from the provisioned software product, are analyzed together with current states of the currently installed bundles. The specified bundles in the state file are compared to the currently installed bundles. The current states of the currently installed bundles are compared to the desired states from the state file to determine whether a current state of the provisioned software product corresponds to the desired state. | 10-17-2013 |
20130275968 | APPLICATION MANAGEMENT METHODS AND SYSTEMS - Example systems and methods of managing applications are described. In one implementation, a load balancer receives a request to start an instance of an application. An orchestrator receives application code associated with the instance of the application and selects a virtual machine template based on the application code. The orchestrator provisions a virtual machine associated with the instance of the application using the virtual machine template. Additionally, the orchestrator notifies the load balancer that the virtual machine is available to start the instance of the application. | 10-17-2013 |
20130326487 | EMULATING CLOUD FUNCTIONING OF APPLICATIONS LOCALLY - In one aspect, an application is received to be to be executed in a local development environment. The application is configured to access at least one service from a number of services of a remote runtime platform. A software development kit (SDK) is selected as an execution environment of the application. The SDK includes a number of application programming interfaces (APIs) of the services and a number of local implementations of the services. In another aspect, the application is executed over the SDK and remote functioning of the application is emulated in the local development environment. | 12-05-2013 |
20130346945 | DEPLOYMENT OF SOFTWARE APPLICATIONS ON A CLOUD COMPUTING PLATFORM - In one aspect, a software application with application artifacts is deployed on a cloud computing platform. The cloud computing platform includes a platform product that can provide functionality that is required by the application. Application metadata is created based on analyzing the application artifacts and describes the application artifacts requirement. An application repository stores the application artifacts and the application metadata. A product description defines an application product for the software application and a product reference to the platform product is defined. The product description and the product reference are published in the application repository to update the application metadata. A composite repository refers to the application product and the platform product. The composite repository is transferred to a platform repository provided by the cloud computing platform. | 12-26-2013 |
20140101202 | File Access Using Counter Locking Mechanism - In an embodiment, a method is provided for accessing a file node. In this method, a file access request specifying a file node to be accessed by way of a file system is received at a server from a client device. A counter is referenced to identify that the file node is being accessed in response to a different file access request. The counter is configured to track whether the file node is being accessed. The file node is provided to the client device when the counter indicates a termination of access to the file node resulting from the different file access request. | 04-10-2014 |