G06F9/465

Communications using the common object request broker architecture (CORBA)
09804899 · 2017-10-31 · ·

Communications using the common object request broker architecture (CORBA) is disclosed. The communications are between a first computing device and a second computing device separated by a NAT device. The first computing device issues a request conforming to the CORBA protocol to obtain an IOR for an object from the second computing device. A first request interceptor on the first device adds a public IP address of the second computing device as user-defined data in the request. A second request interceptor on the second computing device extracts the IP address from the request and stores it. The second computing device builds the IOR for the object including embedding the public IP address of the second computing device in the IOR. The second computing device sends the IOR to the first computing device. The first computing device then establishes a successful connection to the public IP address received in the IOR.

Extending object-schema-based application programming interfaces (APIS)
09804886 · 2017-10-31 · ·

The present disclosure relates to extending object-schema-based application programming interfaces (APIs). According to one embodiment, a method generally includes receiving, from a user, a schema defining an extension to the API and a reference to a parent node in a graph projection of the API. An API system updates the graph projection of the API to include a node representing the extension and navigable path to the node representing the extension. The API system processes a request from the user by traversing through the updated graph projection of the API, the request representing the navigable path to the node representing the extension.

FAULT-TOLERANT AND HIGHLY-AVAILABLE CONFIGURATION OF DISTRIBUTED SERVICES
20170285982 · 2017-10-05 ·

Fault-tolerant and highly available configuration of distributed services including a computer-implemented method for role-based configuration discovery comprising receiving a request comprising an identifier of a role; identifying a first key, in a replica of a distributed configuration store, comprising a first value that matches the role identifier; identifying one or more other key-value pairs associated in the replica with the first key; and returning a response to an entity that sent the request comprising the value of at least one key-value pair that is specific to the role the service has. Also disclosed are techniques for log forwarding.

Managing nodes in a high-performance computing system using a node registrar

A method of managing nodes in a high-performance computing (HPC) system, which includes a management subsystem and a job scheduler subsystem, includes providing a node registrar subsystem. Logical node management functions are performed with the node registrar subsystem. Other management functions are performed with the management subsystem using the node registrar subsystem. Job scheduling functions are performed with the job scheduler subsystem using the node registrar subsystem.

Managing invocation of tasks

A graph-based program specification includes components, at least one having at least one input port for receiving a collection of data elements, or at least one collection type output port for providing a collection of data elements. Executing a program specified by the graph-based program specification at a computing node, includes: receiving data elements of a first collection into a first storage in a first order via a link connected to a collection type output port of a first component and an input port of a second component, and invoking a plurality of instances of a task corresponding to the second component to process data elements of the first collection, including retrieving the data elements from the first storage in a second order, without blocking invocation of any of the instances until after any particular instance completes processing one or more data elements.

DISTRIBUTED STANDARDS REGISTRY FOR CLOUD COMPUTING ENVIRONMENTS
20220311838 · 2022-09-29 ·

Techniques for providing a distributed standards registry are provided. A DSR system may include a plurality of distributed standards registry participants that are collectively configured to provide control logic for the distributed standards registry using a consensus voting mechanism to make control decisions. The DSR system includes include a distributed ontology model library maintained on the plurality of distributed standards registry participants and storing a plurality of ontology models, and a distributed federation broker registry maintained across the plurality of distributed standards registry participants. A first distributed standards registry participant of the plurality of distributed standards registry participants includes a discovery processor operable to receive and process federation participant queries and a registry processor operable to receive and process registration requests to register the federation broker as providing brokerage services related to a federation service described by one of the plurality of ontology models.

CLIENT DRIVEN MULTI-SITE CONSISTENCY FOR OBJECT STORAGE
20220035726 · 2022-02-03 ·

A notification configuration associated with an object is received by a first host system from a client device. The notification configuration causes host systems to generate notifications for the client device upon storing the object at the host systems. The object is stored in a first memory of the first host system. The notification configuration is transmitted by the first host system to a second host system. The object is provided to the second host system, wherein the second host system is to transmit a notification to the client device upon storing the object at a second memory of the second host system.

Methods and apparatus for allowing user configuration of dynamic endpoint generators and dynamic remote object discovery and brokerage

A method for allowing user configuration of an endpoint for consuming a business object includes: loading a definition of the business object, the definition having properties and methods; mapping the definition to endpoint-supported protocols; and allowing user configuration of the endpoint based upon at least one of: (i) services configuration, (ii) protocol configuration, or (iii) managed configuration.

SYSTEM AND METHOD FOR PROCESS AND DATA OBSERVATION IN A NETWORKED SERVICE ENVIRONMENT
20210389983 · 2021-12-16 ·

Embodiments as disclosed herein provide computing systems and methods that effectively serve to isolate processes in a computing environment. The isolation of such processes may serve additionally to substantially increase the observability of such processes, allowing a granular insight into data associated with those processes and the performing of individual tasks.

Access control center auto launch

Methods and systems provide indirect and temporary access to a company's IT infrastructure and business applications. The methods/systems involve establishing an access control center (ACC) to control the access that technical support personnel may have to the company's IT infrastructure and business applications. Thin client terminals with limited functionality may then be set up in the ACC for use by the technical support personnel. The thin client terminals connect the technical support personnel to workstations outside the ACC that operate as virtual desktops. The virtual desktops in turn connect the technical support personnel to the IT infrastructure and business applications. An ACC application may be used to automatically establish the connection between the thin client terminals and the virtual desktops and the virtual desktops and the IT infrastructure and business applications.