Patent classifications
G06F9/4492
Attribute inheritance of related objects for a digital object architecture
For digital objects registered via the DOA infrastructure, attribute inheritance is enabled between related objects using naming conventions for the handle IDs or data models for handle data. Each child object of a parent object may automatically inherit at least one predetermined attribute of the parent object. When a retriever machine (local handle registry or client machine) obtains a handle ID for a digital object, the retriever machine may determine that the digital object is a child object of a parent object, determine a handle ID for the parent object, obtain the author attribute from the handle data of the parent object, and associate the author attribute of the parent object with the child object. The retriever machine may determine that the digital object is a child object of the parent object via naming conventions for handle IDs or via data models for the handle data.
Managing custom attributes for domain objects defined within microservices
In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom attributes and corresponding values for domain objects defined within microservices. In accordance with various aspects, a method is provided that comprises: receiving a custom attribute request for a domain object defined in a microservice that comprises a domain object identifier, a custom attribute to add to the domain object, and a value type for the custom attribute; identifying, based on the domain object identifier and the value type, a custom value table for the domain object that comprises placeholder fields; identifying a placeholder field that is available in the custom value table; and storing a record in the attribute schema table for the domain object and the custom attribute comprising mapping data that maps the custom attribute to the placeholder field for the custom value table.
Reducing classloading of hierarchically configured applications via provisioning
Reducing classloading of hierarchically configured applications via provisioning is disclosed. In one example, a hierarchically configured application is launched within a first container of a container application platform according to a set of resource descriptions that define a structure of the hierarchically configured application, valid operations may be performed by elements of the hierarchically configured application, and handlers for each operation. After the process of loading the classes representing the resource descriptions and operation handlers is performed, services to be used by the hierarchically configured application are installed. The state of each service is then determined, and one or more serialized data structures representing the state of the services is generated. Subsequently, the hierarchically configured application is launched within a second container, with the serialized data structures being used to install the services within the second container while incurring lower classloading overhead.
DISTINGUISHED NEST-BASED ACCESS CONTROL
Techniques for determining and displaying error messages including a cause of an error generated because two types are not members of the same nest are disclosed. The system detects, at runtime, an instruction in a first type that attempts to access a private member of a second type. The system evaluates one or more nestmate criteria to determine whether the first type and the second type are within a same nest. A nest host corresponding to the nest specifies each nest member of the nest, and each nest member specifies an association with the nest. Responsive to determining that a particular nestmate criterion is not met, the system determines that the first type and the second type are not within the same nest and records or displays data identifying the particular nestmate criterion that has not been met, and throws an access error.
Service model-oriented software system and operation method thereof
A service model-oriented software system and an operation method of the present invention take a service module object as a basic component to drive the software system to run; support componentized software running and development, provide loose coupling, good openness and high security and is easy to be expanded. The software system includes a server-sided system architecture and a client-sided system architecture; the server-sided system architecture includes a service model factory component, a service model control engine and an activity service model component; the client-sided system architecture includes a client-sided control engine, a data object agent component and a view component. The software system and the operation method thereof lay a solid foundation for the development of the service-oriented software technology, provide solutions for the development of the computer software system in the cloud environment, and open new ideas and methods for the development and application of the software.
Facilitating multi-inheritance within a single inheritance container-based environment
Multi-inheritance within a single-inheritance, container-based data processing environment is provided for facilitating developing, storing, shipping and/or running software applications. More particularly, a facility is provided which includes generating, based on a configuration file with a multi-inheritance instruction, a composited image for a new container from multiple exiting images of the single-inheritance container-based environment. The multiple existing images are identified in the multi-inheritance instruction, and the generating includes creating a composited directory file which, in part, references layers of the multiple existing images and associating a command instruction of the configuration file with the composited file. The composited image is then built in associated with starting the new container based on the composited directory file and the associated command.
Generating asynchronous runtime compatibility in JavaScript applications
Methods and computer-readable media are disclosed herein for generating asynchronous runtime compatible applications from non-asynchronous applications. In embodiments, source code for the application that is not compatible with asynchronous processing is examined. The source code is parsed in order to identify unsafe functions that will cause failures of the application when processed in an asynchronous runtime. The source code corresponding to those unsafe functions is modified by adding asynchronous functions and commands to the source code and restructuring the source code. The modified source code may then be provided to an asynchronous runtime environment as the application is now compatible with asynchronous processing.
Augmenting an original class with an augmenting class
An augmenting system for augmenting a program's original class with an augmenting class is provided. In some embodiments, the augmenting system receives a definition of an augmenting class that includes a data member. The augmenting system generates resolution code for the computer program. The resolution code is for accessing a reference to an original instance of the original class and providing a reference to a corresponding augmenting instance of the augmenting class. When processing a statement of the computer program that accesses the data member using the reference to the original instance, the augmenting system generates access code for the computer program. The access code uses the resolution code to retrieve the reference to the augmenting instance for the original instance and accesses the data member based on the retrieved reference to the augmenting instance.
Systemic extensible blockchain object model comprising a first-class object model and a distributed ledger technology
A method for processing one or more message passing transactions sent from one or more client computers to one or more distributed ledger accounts, of one or more distributed ledgers, executed on one or more distributed ledger nodes, themessage passing transactions processed by one or more class manager infrastructure intrinsics.
Instantiating resources of an IT-service
Instantiating a resource of an IT-service includes analyzing a service model of an IT-service, the service model including a node representing a resource for providing the IT-service. A resource type of the resource being indicated by the node is determined, and a resource manager being operable to instantiate the resource is identified. A resource-manager-specific API of the resource manager is identified, and at least one abstract method for instantiating the resource is overridden with a resource-manager specific method of the resource-manager-specific API. The resource-manager specific method for instantiating the resource represented by the node is executed.