会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Centrally controlled proximity based software installation
    • 集中控制的基于邻近的软件安装
    • US08904379B2
    • 2014-12-02
    • US13527116
    • 2012-06-19
    • Peter R. ManahanLeho Nigul
    • Peter R. ManahanLeho Nigul
    • G06F9/445H04L29/08
    • G06F8/61H04L67/18H04L67/34
    • An illustrative embodiment of a computer-implemented process for a centrally controlled proximity based software installation receives a request to install a software package, sends a list of machines associated with the received request to a rules engine and generates a set of proximity groups using the list of machines. The computer-implemented process uploads the software package of the received request to a selected machine within a proximity group of the set of proximity groups, instructs the selected machine to install the software package and instructs the remaining machines associated with the proximity group of the selected machine to download the software package from the selected machine and to install the software package. Responsive to a determination that no more requests exist, the computer-implemented process reports to a central installer.
    • 用于中央控制的基于邻近的软件安装的计算机实现的过程的说明性实施例接收安装软件包的请求,将与接收的请求相关联的机器的列表发送到规则引擎,并使用列表生成一组邻近组 的机器。 计算机实现的过程将接收到的请求的软件包上传到该组邻近组的接近组内的所选择的机器,指示所选择的机器安装软件包并指示与所选择的邻近组相关联的剩余机器 机器从所选机器下载软件包并安装软件包。 响应于确定不再有请求存在,计算机实现的过程向中央安装程序报告。
    • 2. 发明申请
    • Centrally Controlled Proximity Based Software Installation
    • 基于中心控制的接近软件安装
    • US20120331460A1
    • 2012-12-27
    • US13527116
    • 2012-06-19
    • Peter R. ManahanLeho Nigul
    • Peter R. ManahanLeho Nigul
    • G06F9/445
    • G06F8/61H04L67/18H04L67/34
    • An illustrative embodiment of a computer-implemented process for a centrally controlled proximity based software installation receives a request to install a software package, sends a list of machines associated with the received request to a rules engine and generates a set of proximity groups using the list of machines. The computer-implemented process uploads the software package of the received request to a selected machine within a proximity group of the set of proximity groups, instructs the selected machine to install the software package and instructs the remaining machines associated with the proximity group of the selected machine to download the software package from the selected machine and to install the software package. Responsive to a determination that no more requests exist, the computer-implemented process reports to a central installer.
    • 用于中央控制的基于邻近的软件安装的计算机实现的过程的说明性实施例接收安装软件包的请求,将与接收的请求相关联的机器的列表发送到规则引擎,并使用列表生成一组邻近组 的机器。 计算机实现的过程将接收到的请求的软件包上传到该组邻近组的接近组内的所选择的机器,指示所选择的机器安装软件包并指示与所选择的邻近组相关联的剩余机器 机器从所选机器下载软件包并安装软件包。 响应于确定不再有请求存在,计算机实现的过程向中央安装程序报告。
    • 3. 发明授权
    • Identifying implicit services links using service usage information
    • 使用服务使用信息识别隐式服务链接
    • US09177073B2
    • 2015-11-03
    • US12938885
    • 2010-11-03
    • Joanna W. NgLeho Nigul
    • Joanna W. NgLeho Nigul
    • G06F7/00G06F17/30
    • G06F17/30893G06F17/30238
    • Embodiments of the invention include a computer-implemented process for identifying implicit services links, using service usage information, in service registries and repositories. Service registry and repository receives service access information for a service to form received information, creates a services access context object in real time from all received information or a selected subset of received information to form a created services access context object, and stores the created services access context object in a data structure to form a stored services access context object. The computer-implemented process further analyzes a set of stored services access context objects in real time to form a set of results, wherein the results are within a predefined certainty and sends the result to a requester. The set of results comprises a set of implicit soft links determined by usage information in the services access context objects, wherein the implicit soft links are implicit services links.
    • 本发明的实施例包括用于在服务注册表和存储库中使用服务使用信息识别隐式服务链接的计算机实现的过程。 服务注册表和存储库接收服务的服务访问信息以形成接收到的信息,从所有接收到的信息或接收到的信息的所选子集中实时创建服务访问上下文对象,以形成创建的服务访问上下文对象,并存储所创建的服务 在数据结构中访问上下文对象以形成存储的服务访问上下文对象。 计算机实现的过程进一步分析一组实时存储的服务访问上下文对象以形成一组结果,其中结果在预定义的确定性内,并将结果发送给请求者。 该组结果包括由服务访问上下文对象中的使用信息确定的一组隐含软链接,其中隐式软链接是隐式服务链接。
    • 5. 发明授权
    • Automatic personalization of user visualization and interaction in a service-oriented architecture interface
    • 在面向服务的体系结构界面中自动个性化用户可视化和交互
    • US08370752B2
    • 2013-02-05
    • US12205296
    • 2008-09-05
    • Diana H. LauHelena LitaniJoanna W. NgLeho Nigul
    • Diana H. LauHelena LitaniJoanna W. NgLeho Nigul
    • G06F3/00
    • G06F17/30893
    • Automatically generating visualization artifacts corresponding to related service operation interfaces is provided. A user level visualization finite state machine instance is created for a specific service instance based on user activation and deactivation of service operations in the specific service instance and user selection of a start visualization state. The service operations are included in a service level visualization finite state machine instance for the specific service instance. Visualization artifacts are automatically generated based on the user level visualization finite state machine instance and parameterized entities bound to a concrete visualization component. The visualization artifacts are outputted in a service operation interface of the specific service instance for a user to visualize and interact with, resulting in the elimination of individual user unwanted server side function in the units of service operations without server side processing.
    • 提供自动生成与相关服务操作界面对应的可视化工件。 基于用户激活和停用特定服务实例中的服务操作以及用户选择开始可视化状态,为特定服务实例创建用户级可视化有限状态机实例。 服务操作包含在特定服务实例的服务级可视化有限状态机实例中。 可视化工件根据用户级可视化有限状态机实例和绑定到具体可视化组件的参数化实体自动生成。 可视化工件在特定服务实例的服务操作界面中输出,供用户可视化和交互,从而在不进行服务器端处理的情况下以服务操作为单位消除个人用户不需要的服务器端功能。
    • 7. 发明授权
    • Software service notifications based upon software usage, configuration, and deployment topology
    • 基于软件使用,配置和部署拓扑的软件服务通知
    • US08707292B2
    • 2014-04-22
    • US13433999
    • 2012-03-29
    • Rodney A. LittleLeho Nigul
    • Rodney A. LittleLeho Nigul
    • G06F9/44
    • G06F8/64G06F8/61G06F8/65
    • Software configuration information and topological information associated with a group of software program instances installed on at least one computing device are tracked. An available software update is identified for at least one of the group of software program instances. At least one software update suggestion rule that specifies a target software configuration and a target topological dependency to which the available software update applies is evaluated against the tracked software configuration information and topological information. A determination is made as to whether the available software update is targeted to the tracked software configuration information and topological information based upon the evaluation of the at least one software update suggestion rule. A notification of the available software update is provided in response to determining that the available software update is targeted to the tracked software configuration information and topological information.
    • 跟踪与安装在至少一个计算设备上的一组软件程序实例相关联的软件配置信息和拓扑信息。 为一组软件程序实例中的至少一个识别可用的软件更新。 根据跟踪的软件配置信息和拓扑信息评估至少一个软件更新建议规则,用于指定可用软件更新所适用的目标软件配置和目标拓扑依赖关系。 基于至少一个软件更新建议规则的评估,确定可用软件更新是针对跟踪的软件配置信息和拓扑信息。 响应于确定可用的软件更新针对跟踪的软件配置信息和拓扑信息,提供了可用软件更新的通知。
    • 8. 发明申请
    • PEER-TO-PEER SHARING IN INTEGRATED DEVELOPMENT ENVIRONMENT
    • 一体化发展环境中的同侪共享
    • US20120060143A1
    • 2012-03-08
    • US12874387
    • 2010-09-02
    • Leho Nigul
    • Leho Nigul
    • G06F9/44
    • G06F8/00G06F8/20G06F21/51G06F2221/2141G06F2221/2145H04L63/102H04L67/104
    • The illustrative embodiments herein provide a computer implemented method for verifying code within an integrated development environment. A first data processing system identifies a code dependency within a first artifact located thereon. The code dependency depends on the second artifact located at the separate node of peer-to-peer network. Responsive to identifying the dependency within the first artifact, the first data processing system identifies a second data processing system within a peer-to-peer network that contains the second artifact. The first data processing system requests permission from the second data processing system to access the second artifact. Responsive to receiving permission to access the second artifact, the first data processing system accesses the second artifact on the second data processing system. The first data processing system then verifies a compatibility of the second artifact with the code dependency within the first artifact.
    • 本文的说明性实施例提供了用于验证集成开发环境内的代码的计算机实现的方法。 第一数据处理系统识别位于其上的第一伪像内的代码相关性。 代码依赖性取决于位于对等网络的单独节点的第二个工件。 响应于识别第一伪像内的相关性,第一数据处理系统识别包含第二伪影的对等网络内的第二数据处理系统。 第一数据处理系统请求来自第二数据处理系统的许可以访问第二神器。 响应于接收访问第二伪像的许可,第一数据处理系统访问第二数据处理系统上的第二伪像。 然后,第一数据处理系统验证第二伪像与第一伪像内的代码依赖性的兼容性。