Methods, apparatus, and program products for configuring components in networked computing environments
First Claim
Patent Images
1. A computer controlled method comprising:
- receiving, by a first component having a first contextual history, a contextual history from a requestor component comprising contextual changes made by one or more other components, wherein the contextual changes comprise component-level context selected from the group comprising operations performed and parameters exchanged;
authenticating the requestor component based on a credibility criteria comprising a value applied to the other components;
applying an operation on the first component based on said contextual changes, comprising;
selecting the requestor component for the other components that satisfy the credibility criteria; and
rolling the first contextual history of the first component back to a state existing prior to application of the operation for the other components that fail to satisfy the credibility criteria; and
storing the received contextual history and a status of the operation with the first contextual history.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, apparatus and program products for gathering contextual history from components in an environment and applying an operation on the gathered history to assist a user in selecting which components to use in the environment.
-
Citations
17 Claims
-
1. A computer controlled method comprising:
-
receiving, by a first component having a first contextual history, a contextual history from a requestor component comprising contextual changes made by one or more other components, wherein the contextual changes comprise component-level context selected from the group comprising operations performed and parameters exchanged; authenticating the requestor component based on a credibility criteria comprising a value applied to the other components; applying an operation on the first component based on said contextual changes, comprising; selecting the requestor component for the other components that satisfy the credibility criteria; and rolling the first contextual history of the first component back to a state existing prior to application of the operation for the other components that fail to satisfy the credibility criteria; and storing the received contextual history and a status of the operation with the first contextual history. - View Dependent Claims (2, 3, 4, 5, 16)
-
-
6. An apparatus comprising:
-
a receiver mechanism of a first component having a first contextual history in receipt of a contextual history from a requestor component comprising contextual changes made by one or more other components, wherein the contextual changes comprise component-level context selected from the group comprising operations performed and parameters exchanged; an authentication mechanism that authenticates the requestor component based on a credibility criteria comprising a value applied to the other components; an operation mechanism that applies an operation on the first component based on said contextual changes, comprising; a selection mechanism that selects the requestor component for the other components that satisfy the credibility criteria; and a rollback mechanism that rolls the first contextual history of the first component back to a state existing prior to application of the operation for the other components that fail to satisfy the credibility criteria; and a storage mechanism that stores the received contextual history and a status of the operation with the first contextual history. - View Dependent Claims (7, 8, 9, 10, 17)
-
-
11. A computer-readable storage medium holding code for performing a method, comprising:
-
code for receiving, by a first component having a first contextual history, a contextual history from a requestor component comprising contextual changes made by one or more other components, wherein the contextual changes comprise component-level context selected from the group comprising operations performed and parameters exchanged; code for authenticating the requestor component based on a credibility criteria comprising a value applied to the other components; code for applying an operation on the first component based on said contextual changes, comprising; code for selecting the requestor component for the other components that satisfy the credibility criteria; and code for rolling the first contextual history of the first component back to a state existing prior to application of the operation for the other components that fail to satisfy the credibility criteria; and code for storing the received contextual history and a status of the operation with the first contextual history. - View Dependent Claims (12, 13, 14, 15)
-
Specification