Customer Service Arcgis Server Cartography Arcsde Government Strategic Planning Microsoft Office Public Speaking Geodatabase Arcims Spatial Analysis Arccatalog Geomatics Project Planning Arcview Arcmap Web Mapping Arcinfo Erdas Imagine Google Earth Team Leadership Budgets Microsoft Word Geography Arcobjects Leadership Gis Gps Analysis Geocoding Arcgis Spatial Databases Team Building Access Supervisory Skills Fme Remote Sensing Geoprocessing Data Management
Howard J. Glaser - San Jose CA, US Laurence E. England - Morgan Hill CA, US Rebecca Lau Poole - San Jose CA, US Chenhong Xia - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F009/44
US Classification:
717173, 717178, 713191, 713155
Abstract:
An installation of an application program is updated by use of a stored configuration of the application program corresponding to a particular user of the local application. In response to a user request, a determination is made that the stored configuration corresponds to the requesting user. The stored configuration is checked to determine if any items described in the stored configuration have been updated. If an item has been updated, then the updated item is retrieved, and the application program is built with the updated item. This stored configuration may also be encrypted and stored in a manifest file which may be decrypted to produce a decrypted configuration responsive to a user authentication. The decrypted configuration is checked to determine if any items described in the decrypted configuration have been updated. If an item has been updated, then the updated item is retrieved, and the application program is built with the updated item.
Trusted Access By An Extendible Framework Method, System, Article Of Manufacture, And Computer Program Product
Rebecca L. Poole - San Jose CA, US Laurence E. England - Morgan Hill CA, US Howard J. Glaser - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 7/00
US Classification:
707100, 707 2, 707 3, 707 9, 707 10
Abstract:
Appropriate actions are identified and associated with a selected artifact in a framework providing a customized application program. A metamodel is specified for a capture of relevant information pertaining to the selected artifact. This metamodel is implemented as a plugin which is integratable into the framework and which allows other plugins of the framework to access the relevant information pertaining to the selected artifact. A collection artifact is generated containing an empty instantiation of the metamodel in which an instantiation of the metamodel may be stored, and the collection artifact is sent to a target platform. On the target platform, the collection artifact containing an instance of the selected artifact is instantiated, and each instantiation of the selected artifact instance contains attributes, characteristics, and a replica of the selected artifact's content. The instantiated collection artifact is transmitted back to the framework, and the selected artifact's attributes and characteristics contained in the instantiated collection artifact are analyzed to ascertain appropriate access and actions allowed on the selected artifact.
Method, System, Computer Program Product, And Article Of Manufacture For Downloading A Remote Computer Program According To A Stored Configuration
Howard J. Glaser - San Jose CA, US Laurence E. England - Morgan Hill CA, US Rebecca Lau Poole - San Jose CA, US Chenhong Xia - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/445 G06F 11/30 G06F 15/173 H04K 1/00
US Classification:
717178, 717168, 713182, 713189, 709223
Abstract:
A configuration of an application program corresponding to a particular user of the local application is defined and stored on a remote server. In response to the user requesting the application program, a session is initiated between the local data processing system and the remote data processing system, and the user is authenticated. Responsive to the user authentication, data is downloaded from the remote server to the local data processing system according to the stored configuration. This stored configuration may be encrypted and stored in a manifest file which is decrypted to produce a decrypted configuration in response to the user authentication, and data may be downloaded from the remote data processing system to the local data processing system according to the decrypted configuration. The application program may be constructed pursuant to the configuration file or the decrypted configuration file.
Interactive Agent For A Topological Multi-Tier Business Application Composer
Rebecca L. Poole - San Jose CA, US Laurence E. England - Morgan Hill CA, US Howard J. Glaser - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44
US Classification:
717104, 717109, 717113
Abstract:
A computer-implemented Integrated Development Environment (IDE) for use in constructing a multi-tier business application for a multiple tier computer network. The IDE is used to create and maintain the multi-tier business application quickly and easily on the multiple tier computer network. The IDE includes a Topological Multi-Tier Business Application Composer and associated Meta-model, wherein the Composer allows the developer to graphically design, develop, maintain, build, test, debug, and deploy the multi-tier business application and the graphical representation of the multi-tier business application is then persistently stored in the Meta-model The IDE also includes an Interactive Agent that monitors the Meta-model for an occurrence of a specific event and then triggers the display of a dialog box or other graphical element in the user interface of the IDE to interact with the developer by displaying context information comprising a list of suggested and recommended actions that advance the creation of the multi-tier business application.
Appropriate actions are identified and associated with a selected artifact in a framework providing a customized application program. A metamodel is specified for a capture of relevant information pertaining to the selected artifact. This metamodel is implemented as a plugin which is integratable into the framework and which allows other plugins of the framework to access the relevant information pertaining to the selected artifact. A collection artifact is generated containing an empty instantiation of the metamodel in which an instantiation of the metamodel may be stored, and the collection artifact is sent to a target platform. On the target platform, the collection artifact containing an instance of the selected artifact is instantiated, and each instantiation of the selected artifact instance contains attributes, characteristics, and a replica of the selected artifact's content. The instantiated collection artifact is transmitted back to the framework, and the selected artifact's attributes and characteristics contained in the instantiated collection artifact are analyzed to ascertain appropriate access and actions allowed on the selected artifact.
Method, System, Computer Program Product, And Article Of Manufacture For Installation And Configuration Of A Computer Program According To A Stored Configuration
Howard J. Glaser - San Jose CA, US Laurence E. England - Morgan Hill CA, US Rebecca Lau Poole - San Jose CA, US Chenhong Xia - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44 G06F 9/445
US Classification:
717177, 717121, 717172
Abstract:
Remote installation of an application program is provided via a configuration of the application program corresponding to a particular user of the local application. The configuration is defined and stored on a remote server. In response to a user request, a determination is made that the stored configuration corresponds to the requesting user, the user is authenticated, and data is downloaded from the remote server according to the stored configuration. This stored configuration is also encrypted and stored in a manifest file which is also downloaded. Responsive to the user authentication, the manifest file is decrypted, and the application program is constructed pursuant to the configuration decrypted from the manifest file.
Method, System, And Program Product For Permission To Access Software
Rebecca Poole - Mountain View CA, US Laurence England - Morgan Hill CA, US Howard Glaser - San Jose CA, US
Assignee:
International Business Machines Corporation
International Classification:
G06F007/00
US Classification:
707/100000
Abstract:
Accessing a legacy target file with a potentially corrupting development tool, where the target file is characterized by its attributes, and the development tool is characterized by its tool capabilities, including the capability to return the target file with changed attributes. Protecting target file attributes is accomplished by limiting development tool access to the target file if development tool capabilities mismatch target file attributes. This is achieved by determining target file attributes from a source of target file attribute information. The determination of access is done by matching target file attributes to tool capabilities and granting development tool access to the target file if there is a match of target file attributes and tool capabilities, and denying or limiting access if there is a mismatch. A further step is assigning a registration permission key tool to the development tool if the development tool capabilities match the target file attributes.
Topological Multi-Tier Business Application Composer
Rebecca Poole - San Jose CA, US Laurence England - Morgan Hill CA, US Howard Glaser - San Jose CA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F009/44
US Classification:
717/100000
Abstract:
A computer-implemented Integrated Development Environment (IDE) for use in constructing a multi-tier business application for a multiple tier computer network. The IDE is used to create and maintain the multi-tier business application quickly and easily on the multiple tier computer network. The IDE includes a Topological Multi-Tier Business Application Composer and associated Meta-model, wherein the Composer allows the developer to graphically design, develop, maintain, build, test, debug, and deploy the multi-tier business application and the graphical representation of the multi-tier business application is then persistently stored in the Meta-model.
American InterContinental University - AA Business Admin
Relationship:
Married
About:
Geek. Â Gamer. Â Aspiring Writer. Â Reader. Â
Rebecca Poole
Education:
Stratford high, Weltec - Design, Victoria
Rebecca Poole
Education:
Croesyceiliog School
Tagline:
Be happy :D
Rebecca Poole
About:
I'm a singer...so who isn't? I hear you cry!I've got no come back. I just love writing songs from my noisy heart and romanticising about life before it got so goddamn complicated! I hope y...
Tagline:
The voice of nostalgia
Rebecca Poole
Rebecca Poole
Rebecca Poole
Rebecca Poole
Flickr
Youtube
Rebecca Poole - Follow Your Heart
One Dance. A hundred and one people Following their Heart! Thanks to e...
Duration:
3m 9s
Go To Sleep - Rebecca Poole
In loving memory of my father- Spencer Michael Poole. Please download ...
Duration:
2m 52s
Rebecca Poole - Alexander Technique
Meet Alexander Technique teacher Rebecca Poole and learn a little abou...
Duration:
4m 55s
SAE Live Lounge - Rebecca Poole - TOO IN LOVE...
SAE Live Lounge - filmed and mixed at SAE Oxford featuring Jazz singer...
Duration:
4m 36s
Purdy (Rebecca Poole) featuring The Remix Jaz...
Purdy (Rebecca Poole ) performs The Real Thing with The Remix Jazz Orc...