Patent application number | Description | Published |
20080288583 | METHOD AND SYSTEM FOR GENERATING AUXILIARY-SERVER CACHE IDENTIFIERS - A method, system, and computer program product, by which portions of the session information that page-content is dependent upon are “pushed” to the client from the origin server in a way such that auxiliary servers, e.g. other application servers and edge-servers, have access to the session information and fragment dependancy data to generate auxiliary-server cache-IDs for the custom pages. This enables distribution of the load away from the origin server, allowing better application distribution and scalability through more effective caching. | 11-20-2008 |
20110252462 | Authenticating a Remote Host to a Firewall - A computer implemented method, system, and computer program product for authenticating a remote host to a firewall. The illustrative embodiments allow a requesting host separated from a target host by a firewall to determine, based on exception handling code, that an original request sent to the target host has been intercepted and blocked by the firewall. The illustrative embodiments also allow the requesting host to automatically provide credentials that authenticate the requesting host to the firewall. The illustrative embodiments are particularly applicable in situations when requests are invoked without any user interaction, such as when a timer expires. In such a case, there is no user to provide the needed credentials to authenticate the requesting host. The illustrative embodiments enable a requesting host to access a target host without requiring user intervention. | 10-13-2011 |
20110258679 | Method and System for Accessing Network Feed Entries - A security mechanism for an application level protocol used to publish and edit web resources is extended to enable enforcement of a security policy on feed entries. The security mechanism ensures that only a certain class of privileged users can perform create, read, update and/or delete (CRUD) actions on feed entries, and it provides a uniform methodology for determining security access controls for resources. The techniques described herein enable selectively display of feed entries while at the same time maintaining a single document source for the privileged users. | 10-20-2011 |
20120005659 | DEBUGGING WORKFLOWS - Some embodiments of the inventive subject matter are directed to a debugging system (“system”) configured to access a work flow document. The workflow document may include references to flow activities connected by flow connectors, forming a workflow path. Some of the flow connectors may have breakpoints. The debugging system can insert command instructions for a hypertext transfer protocol (HTTP) request into the workflow document at locations associated with the flow connectors and initiate a test run of the workflow path. In some embodiments, during the test run, when one of the flow connectors is reached, the system executes the command instructions for the HTTP request, sending the HTTP request to a debugger application (“debugger”). If a breakpoint is associated with the flow connector, the debugger can delay response to the HTTP request, otherwise the debugger can respond immediately. A user can debug the workflow document during the delay. | 01-05-2012 |
20130191528 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 07-25-2013 |
20130227132 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 08-29-2013 |
20140149421 | DYNAMICALLY QUANTIFYING THE DEMAND OF EACH SOFTWARE COMPONENT OF EACH SOFTWARE STACK DEPLOYED IN THE CLOUD ENVIRONMENT - A method, system and computer program product for dynamically quantifying a demand for the software components deployed in a cloud environment. An administrative server generates a table mapping the software levels of the software components of the deployed software stacks with the number of instances of the deployed software stacks tracked over a period of time. The depth weight based on subtracting a depth index (zero-based) from a depth size is calculated for each software component, where a depth index refers to the software level of the software component in question and a depth size refers to the number of software levels for the software stack bearing the software component in question. A metric used in quantifying the demand for the software component (“popularity index”) is then determined for each software component based on the number of deployed instances and the depth weight for that software component. | 05-29-2014 |
20150033285 | NON-INTRUSIVE METHOD AND APPARATUS FOR AUTOMATICALLY DISPATCHING SECURITY RULES IN CLOUD ENVIRONMENT - The present invention relates to a non-intrusive method and apparatus for automatically dispatching security rules in a cloud environment. The method comprises: forming a composition application model of an application in the cloud environment, said composition application model including at least types of various servers for deploying said application; generating a topology model of said various servers in the cloud environment; automatically generating security rules to be adopted by the server-side firewalls of respective servers based on the application context of said application, said composition application model and said topology model; and dispatching said security rules to each server-side firewall based on said composition application model and topology model. | 01-29-2015 |