CA2388624A1 - Architectures for netcentric computing systems - Google Patents

Architectures for netcentric computing systems Download PDF

Info

Publication number
CA2388624A1
CA2388624A1 CA002388624A CA2388624A CA2388624A1 CA 2388624 A1 CA2388624 A1 CA 2388624A1 CA 002388624 A CA002388624 A CA 002388624A CA 2388624 A CA2388624 A CA 2388624A CA 2388624 A1 CA2388624 A1 CA 2388624A1
Authority
CA
Canada
Prior art keywords
service
tool
management
architecture
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002388624A
Other languages
French (fr)
Other versions
CA2388624C (en
Inventor
Marina Goodman
Tor Mesoy
Stanton J. Taylor
Scott R. Reiter
Michael T. Bowen
Ralph Auriemma
Tamara D. Alairys
Chris M. Degiorgio
Lizbeth Johnson Coleman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Accenture Global Services Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2388624A1 publication Critical patent/CA2388624A1/en
Application granted granted Critical
Publication of CA2388624C publication Critical patent/CA2388624C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/541Interprogram communication via adapters, e.g. between incompatible applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/1658Data re-synchronization of a redundant component, or initial sync of replacement, additional or spare unit
    • G06F11/1662Data re-synchronization of a redundant component, or initial sync of replacement, additional or spare unit the resynchronized component or unit being a persistent storage device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2002Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where interconnections or communication control functionality are redundant
    • G06F11/2005Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where interconnections or communication control functionality are redundant using redundant communication controllers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2002Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where interconnections or communication control functionality are redundant
    • G06F11/2007Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where interconnections or communication control functionality are redundant using redundant communication media
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2023Failover techniques
    • G06F11/2028Failover techniques eliminating a faulty processor or activating a spare
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2097Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements maintaining the standby controller/processing unit updated
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Stored Programmes (AREA)

Abstract

An execution architecture, a development architecture and an operations architecture for a netcentric computing system. The execution architecture contains common, run-time services required when an application executes in the netcentric computing system. The development architecture is the production environment for one or several systems development projects as well as for maintenance efforts. The purpose of the development environment is to support the tasks involved in the analysis, design, construction, and maintenance of business systems, as well as the associated management processes. It is important to note that the environment should adequately support all the development tasks, not just the code/compile/test/debug cycle. The operations architecture is a combination of tools and support services required to keep a production system up and running efficiently.

Claims (56)

1. An execution architecture for a netcentric computing system, comprising:
a client connected with a server;
wherein said client includes a presentation service, an information service, a communication service, a communication fabric service, a transaction service, an environment service and a business logic service; and wherein said server includes a base service, said information service, said communication service, said communication fabric service, said transaction service, said environment service and said business logic service.
2. The execution architecture of claim 1, wherein said presentation service may be selected from the group consisting of a desktop manager service, a direct manipulation service, a forms service, an input device service, a report and print service, a user navigation service, a web browser service and a window system service.
3. The execution architecture of claim 2, wherein said web browser service may be selected from the group consisting of a browser extension service, a web browser form service and a web browser user navigation service.
4. The execution architecture of claim 1, wherein said information services comprise database services and document services.
5. The execution architecture of claim 4, wherein said database services may be selected from the group consisting of a database storage service, a database indexing service, a database security service, a database access service and a database replication/synchronization service.
6. The execution architecture of claim 4, wherein said document services may be selected from the group consisting of a document storage service, a document indexing service, a document security service, a document access service, a document replication/synchronization service and a document versioning service.
7. The execution architecture of claim 1, wherein said communication service may be selected from the group consisting of a messaging service, a communication security service, a virtual resource service and a directory service.
8. The execution architecture of claim 7, wherein said messaging service comprise core messaging services and specialized messaging services.
9. The execution architecture of claim 8, wherein said core messaging service may be selected from the group consisting of a file transfer service, a remote procedure call service, a message-oriented service and a streaming service.
10. The execution architecture of claim 8, wherein said specialized messaging services may be selected from the group consisting of an E-mail service, a database access messaging service, a object request broker messaging service, a computer-telephone integration messaging service, an electronic data interchange messaging service and a legacy integration messaging service.
11. The execution architecture of claim 7, wherein said communication security service may be selected from the group consisting of an encryption service, an identification/authentication service and an access control service.
12. The execution architecture of claim 7, where said virtual resource service may be selected from the group consisting of a fax service, a file sharing service, a paging service, a phone service, a terminal service, a printing service and an audio/video service.
13. The execution architecture of claim 1, wherein said communications fabric service comprises a transport service and a network media service.
14. The execution architecture of claim 13, wherein said transport service may be selected from the group consisting of a message transport service, a packet forwarding/Internetworking services, a circuit switching service, a transport security service, a network address allocation service and a quality of service.
15. The execution architecture of claim 13, wherein said network media seance may be selected from the group consisting of a media access service and a physical media access service.
16. The execution architecture of claim 1, wherein said environment service may be selected from the group consisting of a runtime service, a system service, an application service, a component framework service and an operating system service.
17. The execution architecture of claim 16, wherein said runtime service comprise language interpreter services and virtual machine services.
18. The execution architecture of claim 16, wherein said system service may be selected from the group consisting of a system security service, a profile management service, an environment verification service and a task and memory management service.
19. The execution architecture of claim 16, wherein said application service may be selected from the group consisting of an application security service, an error handling/logging service, a state management service, a code table service, an active help service, a file service, an application integration interface service and a common service.
20. The execution architecture of claim 1, wherein said transaction service may be selected from the group consisting of a transaction monitor service, a resource management service, a transaction management service and a transaction partitioning service.
21. The execution architecture of claim 1, wherein said base service may be selected from the group consisting of a web server service, a push/pull service, a batch processing service, a report service and a workflow service.
22. The execution architecture of claim 1, wherein said business logic service comprises interface logic, application logic and database abstraction.
23. A development architecture for a netcentric computing system, comprising:
a development organization framework layer;
a development process framework layer; and a development tools framework layer.
24. The development architecture of claim 23, wherein said development organization framework layer comprises an information management team, a quality team, an environment management team, a release management team, a configuration management team, a problem management team, a program and project management team and a security management team.
25. The development architecture of claim 23, wherein said development process framework layer comprises a system building service, a management process service, a security management process service, a quality management process service, a program and project management process service, an environment management process service, a release management process service, a configuration management process service and a problem management process seance.
26. The development architecture of claim 25, wherein said information process management service may be selected from the group consisting of a repository management service, a folder management service, a media content management service and an object management service.
27. The development architecture of claim 25, wherein said environment process management service may be selected from the group consisting of a managing change service, a service management service, a service planning service and a systems management service.
28. The development architecture of claim 25, wherein the systems building service comprises a analysis and design service, a reverse engineering service, a packaged component integration service, a construction service and test service.
29. The development architecture of claim 23, wherein said development tools framework layer comprises a system building tool, an information management tool, a security management tool, a quality management tool, a program and project management tool, an environment management tool, a release management tool, a productivity tool, a collaboration tool and a process integration tool.
30. The development architecture of claim 29, wherein said collaboration tool may be selected from the group consisting of an e-mail tool, a teamware tool, a group scheduling tool, an audiovisual conference tool and a shared workplace system.
31. The development architecture of claim 29, wherein said information management tool is responsible for repository management, folder management, media content management and object management.
32. The development architecture of claim 29, wherein said quality management tool may be selected from the group consisting of a metric tool, a statistical process control tool, a continuous improvement tool and a training tool.
33. The development architecture of claim 29, wherein said configuration management tool may be selected from the group consisting of a version control tool, a change control tool and a migration control tool.
34. The development architecture of claim 29, wherein said environment management tool may be selected from the group consisting of a service management tool, a systems management tool, a managing change tool and a service planning tool.
35. The development architecture of claim 34, wherein said systems management tool may be selected from the group consisting of a startup and shutdown tool, a back-up and restore tool, an archiving tool, a security tool and a performance and monitoring tool.
36. The development architecture of claim 29, wherein said system building tool may be selected from the group consisting of an analysis and design tool, a reverse engineering tool, a package component integration tool, a construction tool and a test tool.
37. The development architecture of claim 36, wherein said analysis and design tool may be selected from the group consisting of a data modeling tool, a process modeling tool, an event modeling tool, a performance modeling tool, a object modeling tool, a component modeling tool, a reuse support tool, a prototyping tool, an application logic design tool, a database design tool, a presentation design tool, a communication design tool and a usability test tool.
38. The development architecture of claim 36, wherein said reverse engineering tool may be selected from the group consisting of an interactive navigation tool, a graphical representation tool, an extraction tool, a repository population tool, a restructuring tool and a data name rationalization tool.
39. The development architecture of claim 36, wherein said construction tool may be selected from the group consisting of a source code editor, a compiler/linker/interpreter, a generation tool, a debugging tool, a quality assurance utility, a code/object library tool and a media content creation tool.
40. The development architecture of claim 36, where said test tool may be selected from the group consisting of a test data management tool, a test data manipulation tool, a test planning tool, a test execution tool, a performance management tool, an emulation tool, a test result comparison tool, a test coverage management tool and a SIR management tool.
41. An operations architecture for a netcentric computing system, comprising:
a operations integration architecture component;
a network/systems management component;
a solution availability component;
a service management component;
a configuration management component;
a physical site management component;
an operations data architecture;
an operations execution architecture; and an operations development architecture.
42. The operations architecture of claim 41, wherein said operations integration architecture comprise an integration framework and a monitoring component.
43. The operations architecture,of claim 42, wherein said integration framework includes an applications program interface and an enterprise management console.
44. The operations architecture of claim 41, wherein said network/systems management component may be selected from the group consisting of a network management tool, a database management tool, an application management tool, a production scheduling tool, an output/print management tool and a security management tool.
45. The operations architecture of claim 44, wherein said network management tool may be selected from the group consisting of a network monitoring component and a network configuration management component.
46. The operations architecture of claim 44, wherein database management component may be selected from the group consisting of a database performance monitoring service and a backup preparation service.
47. The operations architecture of claim 44, wherein said output/print management tool may be selected from the group consisting of a output job and queue manager and a physical device manager.
48. The operations architecture of claim 41, wherein said solutions availability component may be selected from the group consisting of a backup/storage/recovery management component and a failover management component.
49. The operations architecture of claim 48, wherein said backup/storage/recovery management component includes an enterprise manager component and a schedule and automation component.
50. The operations architecture of claim 41, wherein said service management component may be selected from the group consisting of a service desk component, a capacity planning component, a user administration component and a service level management component.
51. The operations architecture of claim 50, wherein said service desk component includes a workflow automation service, a service desk database, an incident querying capability service and a service desk reporting service.
52. The operations architecture of claim 50, wherein said capacity planning component includes a data collection agent, a scenario modeling agent and a data capture agent.
53. The operations architecture of claim 41, wherein said configuration management components may be selected from the group consisting of a software distribution/file transfer component, an asset management component, a change control component, a migration control component and a systems configuration management component.
54. The operations architecture of claim 53, wherein said asset management component includes inventory management tools and license management tools.
55. The operations architecture of claim 53, wherein said change control component includes a change control workflow automation application, a change control database and a change control reporting service.
56. The operations architecture of claim 41, wherein said physical site management component includes a UPS/generator component, a raised floor, a fire suppression and climate control system, a plurality of wiring/cabling and a disaster recovery component.
CA2388624A 1999-11-03 2000-11-03 Architectures for netcentric computing systems Expired - Lifetime CA2388624C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US16347799P 1999-11-03 1999-11-03
US60/163,477 1999-11-03
US67622700A 2000-09-29 2000-09-29
US09/676,227 2000-09-29
PCT/US2000/030519 WO2001033349A2 (en) 1999-11-03 2000-11-03 Architectures for netcentric computing systems

Publications (2)

Publication Number Publication Date
CA2388624A1 true CA2388624A1 (en) 2001-05-10
CA2388624C CA2388624C (en) 2011-07-12

Family

ID=26859669

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2388624A Expired - Lifetime CA2388624C (en) 1999-11-03 2000-11-03 Architectures for netcentric computing systems

Country Status (4)

Country Link
EP (1) EP1226495A2 (en)
AU (1) AU1361701A (en)
CA (1) CA2388624C (en)
WO (1) WO2001033349A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410314A (en) * 2018-04-28 2019-03-01 武汉思普崚技术有限公司 The method and device of topological structure dynamic rendering based on three-dimensional space
CN113536501A (en) * 2021-07-19 2021-10-22 西安流固动力科技有限公司 Distributed numerical simulation comprehensive analysis platform based on cloud computing and construction method thereof
CN115396330A (en) * 2022-08-31 2022-11-25 南京维拓科技股份有限公司 Method for intelligently detecting and controlling server to be shut down in data center

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002017075A2 (en) * 2000-08-22 2002-02-28 Symbian Limited A method of enabling a wireless information device to access data services
US8374966B1 (en) 2002-08-01 2013-02-12 Oracle International Corporation In memory streaming with disk backup and recovery of messages captured from a database redo stream
WO2004061619A2 (en) 2002-12-30 2004-07-22 Thomson Corporation Knowledge-management systems for law firms
US7987268B2 (en) 2003-10-23 2011-07-26 International Business Machines Corporation Methods and systems for dynamically reconfigurable load balancing
US7493592B2 (en) * 2003-10-24 2009-02-17 Microsoft Corporation Programming interface for a computer platform
WO2007006124A1 (en) 2005-04-18 2007-01-18 Research In Motion Limited Container-level transaction management system and method therefor
US7483757B2 (en) 2005-07-22 2009-01-27 Honeywell International, Inc. Control system migration
US7921452B2 (en) 2005-08-23 2011-04-05 The Boeing Company Defining consistent access control policies
US8056114B2 (en) 2005-08-23 2011-11-08 The Boeing Company Implementing access control policies across dissimilar access control platforms
US9565191B2 (en) 2005-08-23 2017-02-07 The Boeing Company Global policy apparatus and related methods
US8271418B2 (en) 2005-08-23 2012-09-18 The Boeing Company Checking rule and policy representation
US7801852B2 (en) 2007-07-31 2010-09-21 Oracle International Corporation Checkpoint-free in log mining for distributed information sharing
TW201601407A (en) 2014-06-24 2016-01-01 萬國商業機器公司 Power distribution unit and alarming method applied in the same
CN110022226B (en) * 2019-01-04 2023-04-04 国网浙江省电力有限公司 Object-oriented data acquisition system and acquisition method
US11330001B2 (en) * 2019-07-31 2022-05-10 EMC IP Holding Company LLC Platform for the extraction of operational technology data to drive risk management applications
US11586978B2 (en) * 2019-10-18 2023-02-21 Amadeus S.A.S. Device, system and method for providing provider objects from a cache
CN111309563A (en) * 2020-03-30 2020-06-19 惠州市美华家具有限公司 Intelligent mattress service information monitoring system
CN112836339B (en) * 2020-12-30 2024-02-13 中国科学院微小卫星创新研究院 Navigation satellite orbit extrapolation software design method
CN112950069A (en) * 2021-03-30 2021-06-11 建信金融科技有限责任公司 Report form test organization system, method, device, equipment and storage medium
CN113127630A (en) * 2021-04-08 2021-07-16 国网福建省电力有限公司信息通信分公司 Power visualization data resource management platform system
US11729057B1 (en) 2022-02-07 2023-08-15 The Bank Of New York Mellon Application architecture drift detection system
CN115174682B (en) * 2022-06-17 2023-07-28 中国银联股份有限公司 Data distribution method, system, center, device and computer readable storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4809170A (en) * 1987-04-22 1989-02-28 Apollo Computer, Inc. Computer device for aiding in the development of software system
WO1992020022A1 (en) * 1991-05-08 1992-11-12 Digital Equipment Corporation Management interface and format for license management system
WO1997012311A2 (en) * 1995-09-15 1997-04-03 Cable & Wireless, Inc. System and method for quality management
US5956479A (en) * 1995-11-13 1999-09-21 Object Technology Licensing Corporation Demand based generation of symbolic information
US6115712A (en) * 1996-07-12 2000-09-05 International Business Machines Corporation Mechanism for combining data analysis algorithms with databases on the internet
US6026500A (en) * 1997-05-13 2000-02-15 Electronic Data Systems Corporation Method and system for managing computer systems
WO1998053396A1 (en) * 1997-05-19 1998-11-26 Electronic Data Systems Corporation Distributed help desk system and method
AU8065698A (en) * 1997-06-13 1998-12-30 True Software, Inc. Systems and methods for scanning and modeling dependencies in software applications
US5905868A (en) * 1997-07-22 1999-05-18 Ncr Corporation Client/server distribution of performance monitoring data
US5960406A (en) * 1998-01-22 1999-09-28 Ecal, Corp. Scheduling system for use between users on the web

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410314A (en) * 2018-04-28 2019-03-01 武汉思普崚技术有限公司 The method and device of topological structure dynamic rendering based on three-dimensional space
CN113536501A (en) * 2021-07-19 2021-10-22 西安流固动力科技有限公司 Distributed numerical simulation comprehensive analysis platform based on cloud computing and construction method thereof
CN115396330A (en) * 2022-08-31 2022-11-25 南京维拓科技股份有限公司 Method for intelligently detecting and controlling server to be shut down in data center

Also Published As

Publication number Publication date
WO2001033349A3 (en) 2002-05-30
CA2388624C (en) 2011-07-12
EP1226495A2 (en) 2002-07-31
AU1361701A (en) 2001-05-14
WO2001033349A2 (en) 2001-05-10

Similar Documents

Publication Publication Date Title
CA2388624A1 (en) Architectures for netcentric computing systems
De Santis et al. Zero-knowledge proofs of knowledge without interaction
US7702729B2 (en) Event heap: a coordination infrastructure for dynamic heterogeneous application interactions in ubiquitous computing environments
CN102638566B (en) BLOG system running method based on cloud storage
GB2304944A (en) Support for application programs in a distributed environment
CN110716748A (en) Service processing method and device, computer readable medium and electronic equipment
US8458693B2 (en) Transitioning from static to dynamic cluster management
CN101719852B (en) Method and device for monitoring performance of middleware
US6532498B1 (en) Method and system for event notification between software application program objects
CN112256406B (en) Operation flow platformization scheduling method
CN112395736A (en) Parallel simulation job scheduling method of distributed interactive simulation system
Mohamed et al. MidCloud: an agent‐based middleware for effective utilization of replicated Cloud services
KR20020021237A (en) Realtime Middleware apparatus providing an integrated software development frameworks of embedded system and its service method
CN112070452A (en) Distributed workflow management system
CN113220480B (en) Distributed data task cross-cloud scheduling system and method
CN115237547A (en) Unified container cluster hosting system and method for non-intrusive HPC computing cluster
US10417051B2 (en) Synchronizing shared resources in an order processing environment using a synchronization component
Buntinas et al. A scalable tools communications infrastructure
Weidmann et al. Conception and Installation of System Monitoring Using the SAP Solution Manager
CN114745377B (en) Edge cloud cluster service system and implementation method
Marowsky-Brée A new cluster resource manager for heartbeat
Malcher et al. Communication management in software projects
Hong et al. Modeling and management of distributed applications and services using the OSI management framework
KR100594019B1 (en) Process Management Method in Distributed Environment
Fuju et al. Scientific simulation execution support on a closed distributed computer environment

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20201103