摘要:
The invention relates to a method for enforcing corporate rules in real time at a user end within a business web application operated from the corporate site server, wherein said web application conveys to a user browser a form to fill in, and wherein said form includes one or more pages, each page comprises one or more fields for receiving user entries, the method comprising: (a) providing a monitoring server at the corporate side; (b) providing a corporate rule base accessible by said monitoring server, wherein each rule within the base comprises at least: (i) a scenario definition, each scenario definition comprises at least one condition depending on a user behavior within a form; and (ii) a predefined action to be activated in real-time when said scenario definition is met; (c) upon accessing the corporate server to receive a form, sending to a user terminal a first page of the form, including an RT monitoring program for monitoring the meeting of one or more rule scenarios at the user terminal and at least a reference to said monitoring server; (d) upon receipt of the form at the user side, activating said RT monitoring program at the user terminal including said reference, thereby to access said monitoring server; (e) upon accessing said monitoring server, sending by the monitoring server to said user terminal one or more rules from said rule base; (f) monitoring by said RT program the user behavior within at least one of the form pages; and (g) upon detection that a rule scenario is met, immediately activating the action which corresponds to said rule scenario.
摘要:
The present invention relates to a system for the preparation of an extended, two layer document, said extended document forms a single package which comprises a text document and a meta-data layer program attached to it, said system comprises a meta-data layer editor, which in turn comprises: (a) a document connector module for receiving a text document, and for parsing the document to document elements; (b) rules editor for defining rules concerning the content of each meta-data layer element, rules concerning to the form of appearance of each meta-data layer element, and action rules concerning conditions for activation of meta-data layer elements, wherein meta-data layer elements correspond to selected document elements of said locked text document; (c) program generator for generating from said rules an intermediate meta-data layer program; and wherein said system further comprises at least one converter for receiving a copy of said locked document and also receiving said intermediate program from said program generator, and for converting the same to said two layer extended document.
摘要:
A real-time activity monitor (RTAM) operates within or in association with a machine (such as a desktop) within a back office environment to automatically track and record desktop processing activities, application usage, as well as manual processing. The real-time activity monitor provides visibility into real-time task processing at the client desktop to enable an enterprise to address back office operational inefficiencies that are exposed by the data. According to a further feature, a recording approach is used to enable a user of the system to automatically define processes and tasks to be monitored. The approach obviates manual configuration by recording application usage actions and then using these interactions as a template for a new process object to be monitored. In an alternative embodiment, the process recorder captures screenshots and enables screen element bookmarking.
摘要:
A method for effecting a direct jump in an executable program module to a target address displaced from a source address by a specified distance that is greater than a maximum permitted range. During program linkage the direct jump is split into at least two component direct jumps each no greater than the maximum permitted range, thus allowing the direct jump to be achieved by jumping sequentially from the source address to the target address via each of the component direct jumps. A storage medium for storing data representative of the executable program module contains at least one trampoline for performing the component direct jumps.
摘要:
A real-time activity monitor (RTAM) operates within or in association with a machine (such as a desktop) within a back office environment to automatically track and record desktop processing activities, application usage, as well as manual processing. The real-time activity monitor provides visibility into real-time task processing at the client desktop to enable an enterprise to address back office operational inefficiencies that are exposed by the data. According to a further feature, a recording approach is used to enable a user of the system to automatically define processes and tasks to be monitored. The approach obviates manual configuration by recording application usage actions and then using these interactions as a template for a new process object to be monitored. In an alternative embodiment, the process recorder captures screenshots and enables screen element bookmarking.
摘要:
A technique for statically linking an application process to a wrapper library employed in intercepting one or more calls invoked by the application process. The intercepted calls may comprise system calls or library calls. In a first link step, the application process is statically linked with at least the intercept library, and in one embodiment, all libraries associated with the application process except for the wrapper library. This first statically linking step creates a first module. Thereafter, at least one call invoked by the application process, and to be intercepted by the intercept library, is renamed. The renaming of the intercepted call is from its original name to a temporary name in the standard program library, the intercept library and the application program. This renaming step creates a second module that no longer contains the original name of the at least one intercepted call. The second linking step is to statically link the second module with the wrapper library, thereby creating an executable module wherein the application process is statically linked to all libraries while still providing for interception of the at least one system or library call within the executable.