Abstract:
Methods and apparatus, including computer program products, implementing and using techniques for a content management system. In response to determining that a change has occurred to a management policy in the content management system and in response to further determining that the content management system includes one or more items that are affected by the change to the management policy, new attribute values are associated with the items asynchronously. The new attribute values are in accordance with the changed management policy.
Abstract:
A case creation event originating from an external content repository is detected by a processor executing an inbound event handler of a distributed integration framework that integrates a case management system with the external content repository. The case creation event is configured by the distributed integration framework to cause creation of a case within the case management system. The inbound event handler instructs the case management system to create the case within the case management system. An outbound event handler of the distributed integration framework instructs the external content repository to create a proxy case to remotely represent the case created within the case management system.
Abstract:
Methods and apparatus, including computer program products, implementing and using techniques for data replication in a cluster. In response to identifying data to replicate in a multi-node system by a first node in a cluster, the data is written concurrently to other nodes in the cluster based on a rule set in a repository. In response to detecting a criterion described in the rule set, an action is performed.
Abstract:
In an approach to caller ID verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital signature associated with the caller. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information. The computing device updates the call record based on the digital signature assessment. The computing device adds timestamp information to the call record. The computing device receives a request from a call recipient device. The computing device communicates information based on the call record to the call recipient device. The computing device marks the call record as expired.
Abstract:
In an approach to caller ID verification by digital signature, a computing device receives caller ID and URL information associated with a call. The computing device retrieves a digital signature based on the URL. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information in order to ascertain the validity of the caller ID information. The computing device performs one or more actions based on the digital signature assessment.
Abstract:
Provided are techniques for holding versions of a document. In response to adding a version of an item to a hold container, another version of the item is automatically added to the hold container based on a hold version policy type associated with the hold container.
Abstract:
Methods and apparatus, including computer program products, implementing and using techniques for data replication in a cluster. In response to identifying data to replicate in a multi-node system by a first node in a cluster, the data is written concurrently to other nodes in the cluster based on a rule set in a repository. In response to detecting a criterion described in the rule set, an action is performed.
Abstract:
Methods for a content management system. In response to determining that a change has occurred to a management policy in the content management system and in response to further determining that the content management system includes one or more items that are affected by the change to the management policy, new attribute values are associated with the items asynchronously. The new attribute values are in accordance with the changed management policy.
Abstract:
Provided are techniques for launching and managing an unattended application program. The application program is launched in background mode. In response to determining that an exit command has been received, an exit command indicator is set to indicate that the exit command has been received and a notification is sent to wake up a blocked main thread of the launched application program.