会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • APPLICATION COMPONENT DECOMPOSITION AND DEPLOYMENT
    • 应用组件分解和部署
    • US20130304788A1
    • 2013-11-14
    • US13470090
    • 2012-05-11
    • Lisa Seacat DeLucaBrian D. GoodmanSoobaek Jang
    • Lisa Seacat DeLucaBrian D. GoodmanSoobaek Jang
    • G06F15/16
    • G06F8/61
    • A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns.
    • 计算机实现的方法,数据处理系统和计算机程序产品在分布式环境中部署应用程序组件。 运行时管理平台为要部署到分布式计算环境的应用程序打开应用程序归档。 运行时管理平台识别应用程序的一组应用程序组件。 运行时管理平台确定定义应用程序组件集合的应用程序组件部署模式的至少一组规则。 运行时管理平台根据定义应用程序组件部署模式的至少一组规则将该组应用程序组件部署到一组运行时容器。
    • 4. 发明申请
    • Desired Font Rendering
    • 期望的字体渲染
    • US20120072978A1
    • 2012-03-22
    • US12883609
    • 2010-09-16
    • Lisa Seacat DeLucaBrian D. GoodmanAngel E. Tomala-Reyes
    • Lisa Seacat DeLucaBrian D. GoodmanAngel E. Tomala-Reyes
    • G06F3/048G06F21/20
    • G06F17/214
    • An embodiment of the invention provides a method for displaying a message from a first user to a second user, wherein the message from the first user is received in a system of the second user. The message includes text in an intended font and metadata, wherein the metadata includes a link to a font source. It is determined whether the intended font is on the system of the second user; and, if the intended font is not on the system of the second user, rendering instructions are obtained from the font source. The rendering instructions include instructions on how to display the text in the intended font on the system of the second user without downloading the intended font to the system of the second user. The text is displayed in the intended font on the system of the second user using the rendering instructions.
    • 本发明的实施例提供了一种用于将消息从第一用户显示给第二用户的方法,其中来自第一用户的消息被接收在第二用户的系统中。 消息包括预期字体和元数据的文本,其中元数据包括到字体源的链接。 确定预期字体是否在第二用户的系统上; 并且如果预期字体不在第二用户的系统上,则从字体源获得渲染指令。 呈现指令包括关于如何在第二用户的系统上以预定字体显示文本而不将预期字体下载到第二用户的系统的说明。 使用渲染指令在第二个用户的系统上以预期的字体显示文本。
    • 5. 发明授权
    • Message broadcasting in a clustered computing environment
    • 群集计算环境中的消息广播
    • US09191236B2
    • 2015-11-17
    • US12783946
    • 2010-05-20
    • Albert DeLuccaLisa Seacat DeLucaBrian D. GoodmanAngel E. Tomala-Reyes
    • Albert DeLuccaLisa Seacat DeLucaBrian D. GoodmanAngel E. Tomala-Reyes
    • G06F15/16H04L12/58
    • H04L12/1827H04L12/1854H04L12/1886H04L45/308H04L51/14H04L51/34H04L67/10H04L67/141
    • Embodiments of the present invention provide message broadcasting within a clustered computing environment such as a Cloud computing environment. Specifically, under the present invention, a message is received in a message queue (e.g., on a message queue server). From the message queue, the message is sent to a single node of a plurality of heterogeneous nodes within the clustered computing environment. The single node can be selected based on any factor such as a best available node within the plurality of nodes. This single node will process the message and identify a set of message listeners to whom the message should be broadcast. Typically, the set of message listeners is identified based on a topic of the message and an association of the topic to the set of message listeners (e.g., as set forth in a table or the like). In any event, the single node will then publish the message to the set of message listeners. Delivery confirmations, responses, etc. associated with the message will then be tracked, processed, and/or routed by the single node. Thus, embodiments of the present invention obviate the need for a given message from having to be delivered to and/or processed by multiple nodes.
    • 本发明的实施例提供了在诸如云计算环境的集群计算环境内的消息广播。 具体地说,在本发明中,在消息队列(例如,在消息队列服务器)上接收到消息。 从消息队列中,消息被发送到群集计算环境中的多个异构节点的单个节点。 可以基于诸如多个节点之间的最佳可用节点的任何因素来选择单个节点。 该单个节点将处理该消息并且识别消息应该被广播的一组消息收听者。 通常,基于消息的主题和主题与消息收听者的集合的关联(例如,如表等中所阐述的)来标识该组消息收听者。 无论如何,单个节点将会将消息发布到一组消息监听器。 与消息相关联的传送确认,响应等将被单个节点跟踪,处理和/或路由。 因此,本发明的实施例避免了给定消息必须被传送到多个节点和/或由多个节点处理的需要。
    • 6. 发明授权
    • Securely identifying host systems
    • 安全地识别主机系统
    • US08694777B2
    • 2014-04-08
    • US12856045
    • 2010-08-13
    • Brian D. GoodmanLisa Seacat DeLuca
    • Brian D. GoodmanLisa Seacat DeLuca
    • H04L29/06
    • H04L63/0876G06F21/73H04L63/0823
    • Embodiments of the present invention allow for “end-user” provisioned instances to securely identify themselves beyond a simple user ID and password. Specifically, embodiments of the present invention use a multi-part security approach that includes (among other things): an identifying key (e.g., a shared private key) known by the cloud security system and the instance; and at least one additional security factor such as an identifier found in TCP/IP packets (e.g., an internet protocol address). In a typical embodiment, a request for an instance (e.g., a virtual machine) is received, and a template (e.g., an image) corresponding to the requested instance is identified. From this template, the instance is provisioned. Under the embodiments of the present invention, the instance will be provisioned to include a security key. When a request is thereafter received from the instance, the request is validated using the security key and the additional security factor(s).
    • 本发明的实施例允许“终端用户”提供的实例可以安全地识别出超出简单用户ID和密码的身份。 具体而言,本发明的实施例使用包括(尤其是)其中的多部分安全性方法:云安全系统和实例已知的识别密钥(例如,共享私钥) 以及至少一个额外的安全因素,例如在TCP / IP分组中找到的标识符(例如,因特网协议地址)。 在典型的实施例中,接收对实例(例如,虚拟机)的请求,并且识别与所请求实例相对应的模板(例如,图像)。 从此模板中,实例已配置。 在本发明的实施例中,实例将被提供以包括安全密钥。 当从该实例接收到请求之后,使用安全密钥和附加的安全系数验证该请求。
    • 7. 发明授权
    • Application component decomposition and deployment
    • 应用程序组件的分解和部署
    • US08918448B2
    • 2014-12-23
    • US13470090
    • 2012-05-11
    • Lisa Seacat DeLucaBrian D. GoodmanSoobaek Jang
    • Lisa Seacat DeLucaBrian D. GoodmanSoobaek Jang
    • G06F15/16
    • G06F8/61
    • A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns.
    • 计算机实现的方法,数据处理系统和计算机程序产品在分布式环境中部署应用程序组件。 运行时管理平台为要部署到分布式计算环境的应用程序打开应用程序归档。 运行时管理平台识别应用程序的一组应用程序组件。 运行时管理平台确定定义应用程序组件集合的应用程序组件部署模式的至少一组规则。 运行时管理平台根据定义应用程序组件部署模式的至少一组规则将该组应用程序组件部署到一组运行时容器。