Patent application number | Description | Published |
20090012987 | METHOD AND SYSTEM FOR DELIVERING ROLE-APPROPRIATE POLICIES - A method of delivering role-appropriate policies. A policy management utility registers a policy in a policy directory that includes a pointer corresponding to a data storage location of the policy and metadata corresponding to the policy. The policy management utility stores the metadata and the pointer in the policy directory, which includes references to policy sources and policy artifacts that correspond to the policy sources. When a user requests information related to a policy, the policy management utility matches the role of the requestor with one of multiple pre-defined corporate roles stored in the policy directory. The policy management utility generates a role-appropriate view in a graphical user interface (GUI). The role-appropriate view corresponds to the role of the requester. The policy management utility provides information related to the policy request within the role-appropriate view. | 01-08-2009 |
20090049508 | LANGUAGE-AGNOSTIC POLICY MANAGEMENT - A system and method for language-agnostic policy management. At least one policy associated with an event occurrence is identified. At least one policy engine associated with the at least one policy is identified. The at least one policy is evaluated by a policy engine of the associated at least one policy engine. | 02-19-2009 |
20090064272 | DATABASE AUTHORIZATION RULES AND COMPONENT LOGIC AUTHORIZATION RULES AGGREGATION - Embodiments of the present invention provide a method, system and computer program product for aggregating database and component logic authorization rules in a multi-tier application. In an embodiment of the invention, a method for aggregating database and component logic authorization rules in a multi-tier application system can include aggregating role-based authorization rules for both a persistence layer and a logic layer of a multi-tier application in a unified policy, distributing the unified policy to both the persistence layer and the logic layer of the multi-tier application, transforming the unified policy into respectively a set of role based permissions for the persistence layer and a set of role based permissions for the logic layer, and applying the set of role based permissions for the persistence layer in the persistence layer, and the set of role based permissions for the logic layer in the logic layer of the multi-tier application. | 03-05-2009 |
20090138585 | Method and System for Generating Messages - The present invention discloses a method and system for generating Simple Object Access Protocol (SOAP) message, wherein, at least one first information sets are pre-stored and each of the first information sets contains at least one piece of information. The method comprises: generating a first SOAP message which contains a second information set that contains at least one piece of information; retrieving a first information set that corresponds to the second information set; and generating a second SOAP message using the retrieved first information set and the first SOAP message. | 05-28-2009 |
20090183184 | DECLARATIVE INSTANCE BASED ACCESS CONTROL FOR APPLICATION RESOURCES WITH PERSISTED ATTRIBUTES AND STATE - Embodiments of the present invention provide a method, system and computer program product for declarative instance based access control for persistent application resources in a multi-tier application. In one embodiment of the invention, a method for instance based access control in a persistent application resource can be provided. The method can include creating one or more instances of an persistent application resource for a particular user or based on attributes of the user, coupling the instance(s) of the persistent application resource to a database implementing row-level access control, initializing access to the database according to a role or attribute for the particular user, and accessing a restricted set of data in the database through the instance(s) of the persistent application resource. | 07-16-2009 |
20110010394 | CLIENT-SPECIFIC DATA CUSTOMIZATION FOR SHARED DATABASES - A client identifier (ID) and a client-specific data field identifier for each item of client-specific data associated with a first client of a set of clients are received at a processor associated with a software as a service (SaaS) module. An extensible markup language (XML) formatted document for storing the client-specific data, including a set of client-specific data elements, each element referenced by one of the client-specific data field identifiers, is created for the first client. The XML formatted document is inserted into an XML formatted column of a row in a database table, where the database table is shared among a set of clients and stored in a shared database. The client ID is inserted into a structured query language (SQL) formatted data column of the row in the database table. | 01-13-2011 |
20110307531 | Converting Images in Virtual Environments - The different illustrative embodiments provide a method, computer program product, and apparatus for converting a first image for a virtual machine formatted for a first virtual environment. A second image is created, wherein the second image is non-specific to any virtual environment. A determination is made whether a portion of files to be copied from the first virtual image to the second virtual image should be replaced using a compatibility matrix, wherein the compatibility matrix identifies changes between the first virtual environment and a second virtual environment. A replacement for the portion of the files is copied to the second image using the compatibility matrix responsive to a determination that the portion of the files in the set of files should be replaced. The file is copied to the second image responsive to an absence of a determination that the each file in the set of files should be replaced. | 12-15-2011 |
20130007726 | Virtual machine disk image installation - A processor copies first and second installable binary files into first and second disk images of first and second virtual machines, respectively, before instantiating the images. The processor can copy first installation parameters and second installation parameters into the first image. The processor copies additional first installation parameters and additional second installation parameters into the second image. The processor at least partially executes a first installation process, based on the first installation parameters, to install the first installable binary files, and a second installation process, based on the additional second installation parameters, to install the second installable binary files. The processor at least partially executes the installation processes in an interleaved manner in relation to one another, based on dependencies. After instantiating the images, the processor can execute scripts based on the second installation parameters and the additional second installation parameters to complete installation. | 01-03-2013 |
20130007739 | Virtual machine disk image installation - A processor copies first and second installable binary files into first and second disk images of first and second virtual machines, respectively, before instantiating the images. The processor can copy first installation parameters and second installation parameters into the first image. The processor copies additional first installation parameters and additional second installation parameters into the second image. The processor at least partially executes a first installation process, based on the first installation parameters, to install the first installable binary files, and a second installation process, based on the additional second installation parameters, to install the second installable binary files. The processor at least partially executes the installation processes in an interleaved manner in relation to one another, based on dependencies. After instantiating the images, the processor can execute scripts based on the second installation parameters and the additional second installation parameters to complete installation. | 01-03-2013 |
20140003284 | Portable Virtual Systems for Composite Solutions | 01-02-2014 |
20140007039 | DISCOVERY AND MODELING OF DEPLOYMENT ACTIONS FOR MULTIPLE DEPLOYMENT ENGINE PROVIDERS | 01-02-2014 |
20140007082 | Discovery and Modeling of Deployment Actions for Multiple Deployment Engine Providers | 01-02-2014 |
20140047176 | DRAM ENERGY USE OPTIMIZATION USING APPLICATION INFORMATION - An application program identifies a plurality of least recently accessed constructs of the application program that reside in DRAM memory. The application program causes the aggregation of at least a portion of the identified least recently accessed constructs onto one or more pages of the DRAM memory. The application program then causes the one or more memory pages of the DRAM memory to be put into self-refresh operation mode. | 02-13-2014 |