会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • AUTOMATED CLUSTER MEMBER MANAGEMENT BASED ON NODE CAPABILITIES
    • 基于节点能力的自动集群会员管理
    • US20090144800A1
    • 2009-06-04
    • US11949172
    • 2007-12-03
    • Elizabeth A. Black-ZiegelbeinTsu-Phin HeeBrian K. MartinMichael J. Smith
    • Elizabeth A. Black-ZiegelbeinTsu-Phin HeeBrian K. MartinMichael J. Smith
    • G06F21/00
    • G06F17/30362G06F9/5061G06F11/142G06F21/604G06F2221/2141G06F2221/2149H04L63/104H04L69/329
    • Embodiments of the present invention provide a method, system and computer program product for automated cluster member management based on node capabilities. In one embodiment of the invention, a method for automated cluster member management based on node capabilities can be provided. The method can include defining a membership policy for a cluster, the membership policy specifying a nodal configuration required for a node in a cluster. The method further can include evaluating different nodes in a computing environment against the membership policy for the cluster. Finally, the method can include associating cluster members in the cluster to only those of the nodes having respective configurations meeting the nodal configuration of the membership policy. Likewise, the method can include evaluating nodes already in the cluster, and disassociating cluster members in the cluster from those of the nodes having respective configurations failing to meet the nodal configuration of the membership policy.
    • 本发明的实施例提供了一种基于节点能力的用于自动化集群成员管理的方法,系统和计算机程序产品。 在本发明的一个实施例中,可以提供基于节点能力的用于自动化集群成员管理的方法。 该方法可以包括为集群定义成员资格策略,成员资格策略指定集群中节点所需的节点配置。 该方法还可以包括针对集群的成员资格策略评估计算环境中的不同节点。 最后,该方法可以包括将集群中的集群成员仅与满足会员策略的节点配置的各个配置的节点相关联。 类似地,该方法可以包括评估已经在集群中的节点,以及使集群中的集群成员与具有不符合成员资格策略的节点配置的各个配置的节点分离。
    • 5. 发明授权
    • Method and apparatus for affinity of users to application servers
    • 用户对应用服务器的亲和力的方法和装置
    • US07523219B2
    • 2009-04-21
    • US12099499
    • 2008-04-08
    • Gennaro A. CuomoMichael L. FraenkelBrian K. Martin
    • Gennaro A. CuomoMichael L. FraenkelBrian K. Martin
    • G00F15/173
    • H04L12/66Y10S707/99937
    • A method and apparatus route hypertext protocol requests to one of a plurality of application servers, which share a database through a backend database management system. The application servers store session data in the database. Hence, if a subsequent request is routed to a different application server, the session data is available through the backend database management system. One or more web servers perform routing of requests to the application server. When a request is received that is accompanied by a session ID, routing is performed by utilizing a hash function on the session ID. The resulting hash value is mapped to an application server. A hash function on a session ID will always result in the same hash value; therefore, the request will always be routed to the same application server. However, if an application server is non-functional, a new hash based on the previous hash is computed until a functional application server is selected.
    • 方法和装置将超文本协议请求路由到通过后端数据库管理系统共享数据库的多个应用服务器之一。 应用程序服务器将会话数据存储在数据库中。 因此,如果后续请求被路由到不同的应用服务器,则会话数据可通过后台数据库管理系统获得。 一个或多个Web服务器执行请求到应用服务器的路由。 当接收到伴随有会话ID的请求时,通过利用会话ID上的散列函数来执行路由。 生成的哈希值映射到应用程序服务器。 会话ID上的散列函数将始终导致相同的散列值; 因此,请求将始终路由到同一应用程序服务器。 然而,如果应用服务器是非功能的,则计算出基于前一个散列的新散列,直到选择功能应用服务器为止。
    • 8. 发明授权
    • State machine for accessing a stealth firewall
    • 用于访问隐形防火墙的状态机
    • US07207061B2
    • 2007-04-17
    • US09944996
    • 2001-08-31
    • Brian K. Martin
    • Brian K. Martin
    • G06F9/00
    • H04L63/0254H04L63/029
    • A stealth firewall. The stealth firewall can include a first network interface to an external network; a second network interface to an internal network; a packet filter for restricting access to the internal network, the packet filter ignoring requests from the external network to access the internal network; and, a state machine. Importantly, the state machine can be pre-configured to transition across one or more internal states conditioned upon receiving particular requests to access the internal network. The state machine further can include at least one state transition reachable through a pre-specified sequence of states which causes the packet filter to permit access to the internal network.
    • 隐形防火墙 隐形防火墙可以包括到外部网络的第一网络接口; 到内部网络的第二网络接口; 用于限制对内部网络的访问的分组过滤器,分组过滤器忽略来自外部网络的访问内部网络的请求; 和状态机。 重要的是,状态机可以被预先配置成在接收到访问内部网络的特定请求的条件下经过一个或多个内部状态转换。 状态机还可以包括通过预先指定的状态序列可达到的至少一个状态转换,这使得分组过滤器允许访问内部网络。