Patent application number | Description | Published |
20090154701 | ON DEVICE NUMBER LOCK DRIVEN KEY GENERATION FOR A WIRELESS ROUTER IN WIRELESS NETWORK SECURITY SYSTEMS - The present invention solve the problems in the prior art by a embedding a number lock system on the router which serves as a input mechanism for entering the shared key or a shared seed which generates a shared key. A combination of numbers and letters may be used on the dials of the number lock. There is a slider to set the security protocol in use or turn it off. Once the user sets his key combination using the number lock on the device and sets a security mechanism he can go to his computer or a PDA or any device that supports Wi-Fi he will use the same mechanism that he does today with existing technology to enter the shared key and select the security mechanism. | 06-18-2009 |
20110145913 | Project Management - Methods, systems, and computer program products for project management. A method embodiment for project management includes accepting a designation of disparate enterprise data from disparate sources in an enterprise system as plan data for a project. The disparate enterprise data is governed by business rules in the enterprise system. The method also includes dynamically aggregating the plan data from the disparate data sources; presenting the aggregated plan data in a project management interface; accepting a manipulation of a portion of the aggregated plan data; enforcing business rules on the aggregated plan data in the project management interface; and committing the manipulated aggregated plan data back to the datasources. | 06-16-2011 |
20120005260 | Method for Optimizing Remote Object Implementations - A method, system and computer-usable medium are disclosed for reducing overhead associated with exporting remote objects. A session context is generated when a remote or local session is respectively established by a remote or local client with a bootstrap remote object. The session context is then determined to be either remote or local and marked accordingly. If the session context is marked as remote, then the bootstrap remote object is exported as remote objects. However, if the session context is marked as local, then the bootstrap remote object is not exported as remote objects. Instead, they are provided for use by the local client as non-exported remote objects. | 01-05-2012 |
20120197925 | Optimization of Database Driver Performance - Memory usage of a database driver is reduced by accessing database elements from a database object within a database during a database operation, generating an element object for each different value of accessed database elements, where the database object includes at least two database elements having the same unique value such that a total number of accessed database elements is greater than a total number of generated element objects, storing the generated element objects in a storage structure, and providing the generated element objects from the storage structure within results for the database operation. | 08-02-2012 |
20140109065 | IDENTIFYING ERRORS USING CONTEXT BASED CLASS NAMES - A method and apparatus for locating errors is disclosed. A computer inserts an object reference into program code suspected of causing an error, the object reference having an initial class name. Responsive to execution of the program code, the computer generates a new class name for the object reference comprising the context information. The computer sets an object with the new class name as the object reference inserted into the program code suspected of causing the error, wherein the new class name of the object is located in computer memory in use by the executing program code. The computer then creates a record of the computer memory in use by the executing program code, the record including the context information in the form of the new class name of the object. | 04-17-2014 |
20150121463 | AUTHORIZING A CHANGE WITHIN A COMPUTER SYSTEM - Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change. | 04-30-2015 |
20150269278 | NON-INTRUSIVE, SEMANTICS-DRIVEN IMPACT ANALYSIS FOR BUSINESS APPLICATIONS - Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect. | 09-24-2015 |
20150269504 | NON-INTRUSIVE, SEMANTICS-DRIVEN IMPACT ANALYSIS FOR BUSINESS APPLICATIONS - Impact analysis for business applications can include receiving an event for a business application system, wherein the event specifies a change to an artifact of the business application system, and determining a node of a directed graph to which the event applies as a source node. The directed graph represents the business application system. The directed graph is formed by a plurality of nodes joined by links, wherein each node represents an artifact of the business application system and each link specifies semantic data indicating a dependency between the nodes joined by the link. Impact analysis further includes determining, using a processor, artifact assessment data for a first node connected to the source node through a first link, wherein the artifact assessment data includes a type of an effect of the event upon the first node and a context for the effect. | 09-24-2015 |