Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

236 results about "Single entity" patented technology

Extensible multi-dimensional framework

Extensible Multi-Dimensional Framework (EMDF) is a system engineering framework for designing, developing and managing enterprise information technology systems. It includes two parts: multi-dimensional architecture framework (MDAF) and three-dimensional unified process (3DUP). MDAF includes comprehensive concepts for modeling an enterprise information technology system. 3DUP provides an iterative system development process. EMDF addresses an enterprise information technology system as a single entity. By projecting this entity on intertwined MDAF dimensions through the 3DUP lifecycle, all logical or physical elements encompassed in the entity will be exposed and captured in well-organized artifacts defined in MDAF. These elements are then prioritized and scheduled in a set of agile iterations. The iterations will be planned in parallel projects implemented by multiple development teams. During a long-term system development lifecycle, some elements may change. The dimensions included in MDAF provide a flexible framework to adjust system architectures, iterations and projects in order to adapt to such changes. The key deliverables of EMDF include an adaptive-to-change quality-focused architecture, optimistic agile iterations, and a market-centric business-driven risk-mitigating process.
Owner:LI DI

Network fabric management via adjunct processor inter-fabric service link

An adjunct processor controls an inter-fabric service link (IFSL) coupled to at least two independent SAN switching networks. The inter-fabric service link is coupled between multiple switching fabrics to allow the attached switching fabrics to be logically managed as a single entity while still being physically independent of each other. The IFSL does not transmit nor receive data being transmitted from a storage device to a host; rather, only management data is transmitted along the IFSL. The IFSL includes an inter-fabric adjunct processor, and a plurality of connections to the attached switching fabrics on which the IFSL communicates with IFSL agents operating on various switching elements within the attached switching fabrics. IFSL agents generate management data corresponding to the particular switching element on which the agent operates. This management data is intermittently transmitted to the IFSL for processing. Upon receipt of this management data, the IFSL updates a fabric map containing the corresponding switching element according to the received management data. As a result, the IFSL has a current snapshot of the status and functionability of each of the switching elements within the attached switching fabrics. Additionally, the IFSL may respond to the received management data by transmitting operation requests to a switching element.
Owner:AVAGO TECH INT SALES PTE LTD

Method and apparatus for logging privilege use in a distributed computing environment

ActiveUS20090319527A1Facilitates tracking privilege useEasily audit privileged operationDigital data processing detailsComputer security arrangementsDistributed Computing EnvironmentClient-side
One embodiment of the present invention provides a system that logs the use of privileges in a distributed computing environment. The distributed computing environment includes a database system, one or more client applications, and a unified security management layer between the database system and the one or more client applications. During operation, the system receives a request from a client application to execute a business function in the distributed computing environment. The system determines a privilege associated with the requested business function, and logs that the request is associated with the privilege. The system then checks, in the unified security management layer, whether a user associated with the request is associated with a role that has the privilege. If the user is associated with a role that has the privilege, the system performs the requested business function. By checking and logging privilege access in the unified security management layer, the system facilitates tracking privilege use for the database system and the client applications in a single entity, thereby enabling security managers to more easily audit privileged operations in the distributed computing environment.
Owner:ORACLE INT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products