Patent application number | Description | Published |
20090013010 | METHOD AND APPROACH TO HOSTING VERSIONED WEB SERVICES - A method for hosting versioned web services includes steps of: receiving a request from a service requester, the request comprising version metadata; parsing the request; extracting the version metadata from the parsing step; and locating a target implementation version using the version metadata. If the target implementation version is located, the method proceeds by dynamically routing the versioned request to the target implementation version. | 01-08-2009 |
20090106350 | METHOD AND APPARATUS FOR DYNAMIC WEB SERVICE CLIENT APPLICATION UPDATE - A method for managing a web service client update without recompiling or redeploying of the client code includes the following steps or acts of: receiving a request for the web service from a subscribed client; transmitting the request to the web service; receiving notification of the web service update from a service provider or registry or some other means; parsing the notification and retrieving parameters describing the web service update; marshalling the parameters; determining whether the new web service update is compatible with the current web service invoked by the client application; updating the local service proxy instance with the marshaled parameters if the new web service update is compatible with the current web service invoked by the client application; and transmitting a notification if the web service update is not compatible with the current web service invoked by the client application. | 04-23-2009 |
20090119158 | METHOD AND DEVICE FOR TRACING AND LOCATING WEB SERVICES CHANGES DURING UPDATING PROCESS - A method and device for tracing and locating web service changes during client web service application updating process. The method and device of the present invention could be implemented in a client application development platform of the web service, or in a server of the web service provider, or in a third party independent of the web service user and provider. The present invention locally customizes release notes or online API update guides for each user. A change history of a target web service concerned by user could be locally traced and locally stored, thus users can easily use said change history to update its codes locally. | 05-07-2009 |
20090319651 | SYSTEM AND METHOD FOR HOSTING ONE OR MORE VERSIONS OF A SERVICE USING A SERVICE PROXY - A method for hosting one or more versions of a service using a service proxy includes specifying an interface definition of a service which defines and uniquely identifies an interface version for the service, and an implementation definition of the service which uniquely identifies an implementation version for the service; generating one or more service proxies each representing an interface version of a service; providing a proxy configuration that contains entries for a plurality of service implementation versions, wherein each proxy utilizes the proxy configuration to access a certain one or more of the implementation versions which share the same or a compatible interface version of a service, and wherein the proxy configuration contains attributes that include information about each of the implementation versions; and wherein the proxy dynamically selects one of the implementation versions in the proxy configuration to route one or more client service requests to based on the attributes. | 12-24-2009 |
20100058197 | SUPPORTING ROLE-BASED ACCESS CONTROL IN COMPONENT-BASED SOFTWARE SYSTEMS - A method, system and computer program product is disclosed for supporting role-based access control in a collaborative environment, wherein pluralities of users work together in a collaborative process using a software system. The method comprises componentizing the software system into a multitude of software components, and limiting access to specific software components to certain users based on roles assigned to the users as defined by a run-time state of the collaborative process. The set of components that a user can access is dynamic, that set can change based on the “context” or the step where the user is in a collaborative workflow/process. Thus, in comparison with traditional access control mechanisms, an embodiment of the invention combines three different elements: a) the set of components that comprise the application is partitioned in such a way as to make componentized role-based access control feasible, b) a method for specifying inter-component dependencies to enable role-based groups, and c) enabling the modification of the access privileges based on contextual information from a collaborative process. | 03-04-2010 |
20100185902 | METHOD AND APPROACH TO HOSTING VERSIONED WEB SERVICES - A method for hosting versioned web services includes steps of: receiving a request from a service requestor, the request comprising version metadata; parsing the request; extracting the version metadata from the parsing step; and locating a target implementation version using the version metadata. If the target implementation version is located, the method proceeds by dynamically routing the versioned request to the target implementation version. | 07-22-2010 |
20120254120 | LOGGING SYSTEM USING PERSISTENT MEMORY - A computer program product, including: a computer readable storage device to store a computer readable program, wherein the computer readable program, when executed by a processor within a computer, causes the computer to perform operations for logging. The operations include: receiving a transaction including data and a log record corresponding to the data; writing the data to a data storage device; and writing the log record to a log space on a persistent memory device coupled to the data storage device. | 10-04-2012 |
20130226955 | BI-TEMPORAL KEY VALUE CACHE SYSTEM - Described herein are techniques for supporting bi-temporal data in a key value cache system. An embodiment provides bi-temporal data as the basic functionality of a key value cache system. An embodiment provides a redesign of the core data structures of a key value cache system, adds bi-temporal data storage in the key value hashing structure, and provides a temporality-aware memory space manager. Embodiments can achieve the same performance as current key value cache systems for regular queries (that is, the queries that only access the current versions of data) while supporting bi-temporal data. | 08-29-2013 |
20130290283 | SCM-CONSCIOUS TRANSACTIONAL KEY-VALUE STORE - Embodiments of a method are described. In one embodiment, the method is a method for executing and supporting transactions. The method includes receiving a transaction comprising a command and data. The method includes writing the data to a transaction manager on a persistent memory device. The transaction manager also maintains a status of the transaction and reference to entries within memory that are manipulated by the transaction. The method also includes creating an in-memory log of the transaction in a first hash directory. The method includes committing a copy of the first hash directory to a second hash directory maintained on a persistent memory device. | 10-31-2013 |
20130290655 | SCM-CONSCIOUS TRANSACTIONAL KEY-VALUE STORE - Embodiments of a system are described. In one embodiment, the system is a device for performing operations and supporting transactions. The device is configured to receive a transaction comprising a command and data. The device writes the data to a transaction manager on a persistent memory device. The transaction manager also maintains a status of the transaction and reference to entries within memory that are manipulated by the transaction. The device also creates an in-memory log of the transaction in a first hash directory. The device then commits a copy of the first hash directory to a second hash directory maintained on a persistent memory device. | 10-31-2013 |
20140059284 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS MEMORY SPACE MANAGEMENT FOR STORAGE CLASS MEMORY - Embodiments of the present invention provide a system, method and computer program products for memory space management for storage class memory. One embodiment comprises a method for information storage in an information technology environment. The method comprises storing data in a storage class memory (SCM) space, and storing storage management metadata corresponding to said data, in the SCM in a first data structure. The method further includes buffering storage management metadata corresponding to said data, in a main memory in a second data structure. | 02-27-2014 |