摘要:
A technique to facilitate the automatic obtaining or extraction of dialogs or screens such as a graphical user interface from executable program code and saving a snapshot of such dialogs or screens in a graphical format. The executable program code is scanned or searched for particular modules within such program code that are used to generate a user interface or dialogue. Each one of these identified GUI-accessible modules is then processed in order to generate, display, and capture their associated user interface(s) or dialogue(s). Any requisite user input or sample data that is required by these modules is automatically generated and provided to assist in the generation, display, and capture of the interfaces/dialogues.
摘要:
Prefetch tags are embedded in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.
摘要:
A technique to facilitate the automatic obtaining or extraction of dialogs or screens such as a graphical user interface from executable program code and saving a snapshot of such dialogs or screens in a graphical format. The executable program code is scanned or searched for particular modules within such program code that are used to generate a user interface or dialogue. Each one of these identified GUI-accessible modules is then processed in order to generate, display, and capture their associated user interface(s) or dialogue(s). Any requisite user input or sample data that is required by these modules is automatically generated and provided to assist in the generation, display, and capture of the interfaces/dialogues.
摘要:
The present invention is a method of providing security for a conference call. The invention identifies a conference call participant as opposed to identifying a caller's telephone. The invention allows the host to selectively include or exclude specific conference call participants. The additional security is accomplished through the use of two computer programs: a host program and a caller program. In the host program, each participant selects a personal user ID and passcode. The host then selects the conference call participants from a database and enters any participation restrictions. In the caller program, the callers call into the conference calling center and attempt to access the conference call. The caller is connected to the conference call only if he enters the correct conference call ID and passcode as well as his authorized user ID and passcode. The host may then restrict the participant as indicated in the host program.
摘要:
An application includes functionality for dynamically modifying controls based on readme documentation content after the development of the application is substantially complete. A developer marks up a documentation file to include references to graphical user interface controls. The application generates a registry that stores associations between the documentation content and the affected controls. The application then modifies the properties of the affected controls to alter presentation or at least one behavior of each affected control. When the application creates an instance of an affected control, the control includes the modified presentation or behavior.
摘要:
The present invention provides a dynamic, easily configurable system, which can be used to encrypt or otherwise hide the internal structure of a network. The present invention protects access to computing systems via a URL by encrypting all or a portion of the URL during the transmission of information over a network. Prior to the actual transmission of the information, fields in the URL can be encrypted using conventional encryption techniques. The encryption will occur after the destination has been determined such that the encryption will not cause the information to be misdirected to a wrong destination. At the destination location, there is first a determination that this URL is an encrypted URL. At this point, a decryption technique is employed based on the predetermined encryption scheme to decrypt the URL. The full URL is now accessed only by the destination location and is not accessible during travel over the network between the originating and destination locations.
摘要:
Web pages are prefetched upon activation of one of three server-side triggers: a service trigger, an access based trigger, and a timed trigger. The service trigger is a subscription service in which the web server agrees to notify the proxy when webpages in the web server are modified. The access based trigger uses logs/metrics to analyze a plurality of users' browsing habits. When the log/metrics database noticeS that a particular webpage experiences heavy requesting traffic during a particular time period, the log/metric creates an access based trigger to prefetch the requested webpage. The timed trigger is a prefetching mechanism that occurs on a regular interval. Configuration data instructs the timed trigger to prefetch a certain webpage a certain times throughout the day.
摘要:
A method for automatically adjusting the volume of individual conference call participants during a conference call. The present invention comprises a Configuration Program (CP) and a Volume Adjustment Program (VAP). The CP allows a user to configure the automatic volume adjustment options. The VAP continuously monitors the conference call and adds new participants to a display screen as the new participants are added to the conference call. Based upon the settings that the user selected in the CP, the VAP adjusts the volume of the conference call participant when the new participant is added, adjusts the volume of each conference call participant upon the occurrence of the time interval, or continuously adjusts the volume of each conference call participant. The VAP also allows the user to manually adjust the volume of all of the participants or an individual participant using a plurality of navigation buttons.
摘要:
A user of a data processing system may specify variability in the generation of data for data-presentation, either by displaying or printing, on an output device. The variability specification may be applied on a glyph-by-glyph basis to the presentation of glyphs. The data processing system provides processing of glyph-based quality variability requests in the following manner. The system receives a request for data-presentation of a series of glyphs and determines, for each glyph in the series of glyphs, whether quality variability is applicable to each glyph. If quality variability is applicable to each glyph, then the system determines a quality variance to be applied to each glyph according to predetermined data-presentation variability data and performs data-presentation of each glyph on an output device in accordance with the quality variance. By providing quality variability on a glyph-by-glyph basis, a relatively simple glyph, such as those used for Latin characters, may be presented using low quality. However, a more complex glyph which may require a clear presentation of its more intricate detail for a proper comprehension of the glyph, such as various Chinese characters, are presented using high quality. In this manner, computing resources may be preserved or tailored on a glyph-by-glyph basis.
摘要:
Methods, systems, e.g., handheld device(s), and computer-program products are disclosed for a user selecting a control component, e.g., a control unit, of an application program. A plurality of available control components can be detected. A shortcut key can be assigned to each detected control component. The assigned shortcut key corresponding to each detected control component can be displayed. An instruction can be transmitted, responsive to one of the shortcut keys being initiated by the user, to the application program to select the corresponding control component.