Abstract:
Embodiments disclosed herein provide a “lazy” approach in caching a hierarchical navigation tree with one or more associated permission trees. In one embodiment, only a portion of a cached permission tree is updated. One embodiment of a method may comprise determining whether a dirty node exists by comparing tree timestamps of the permission tree and the master tree. If the tree timestamp of the master tree is temporally more recent than the tree timestamp of the permission tree, the permission tree has a dirty node and the method may operate to check node timestamps of the master and permission trees. This process may be repeated until the dirty node is found, at which time a portion of the permission tree associated with the dirty node may be reconstructed, rather than the entire permission tree itself, thereby eliminating or significantly reducing access time to the cached permission tree.
Abstract:
Search engines today are capable of incorporating numeric scoring modifiers from controlling applications into their relevance computations. Challenges arise in keeping these modifiers current, given that they may change over time. Embodiments provide a new way to compute numeric value decay for efficient relevance computation without having to rely on a controlling application. The controlling application can set a value for a modifier of an object managed by the controlling application and the controlling application can perform operations on the modifier. However, the controlling application does not need to keep track of the modifier and compute the modifier value independently. Rather, a search engine is configured to perform decay computation(s) and adjust the modifier value on a regular basis or on demand. The search engine ensures that modifier values for all the objects indexed by the search engine are always valid—within acceptable ranges and with acceptable adjustments.
Abstract:
An automated rule-based system for facilitating delivery of a fax document from a source to a destination over a network where an initial delivery attempt has been unsuccessful. Rules may be stored in a database. The database may include rules based on past delivery information or new delivery instructions. When an input condition is determined, the database may be traversed to determine an action based on the set of rules. The actions may include one or more of resubmitting the fax document to the network for a next delivery attempt, cancelling the document, and identifying the destination as a technical problem. The input conditions may include an identification of non-business days and non-business hours.
Abstract:
In some embodiments, a parent object may share its assets with its descendent(s) in a hierarchical asset sharing model. The hierarchical asset sharing model may specify a plurality of asset sharing modes. In a first mode, an asset of the parent is imposed on a child. The child is able to utilize the asset, but unable to modify or delete the asset. In a second mode, the child is able to utilize the asset and a copy of the asset is generated when the child attempts to modify the asset. The child can modify the copy of the asset, which is stored as an asset only of the child. The original asset is no longer shared becomes an asset only of the parent. In a third mode, both the parent and the child can utilize and modify the asset.
Abstract:
The present invention provides a system and method for file synchronization. One embodiment of the system of this invention includes a software program stored on a computer readable medium. The software program can be executed by a computer processor to receive a file from a server; store the file as a cached file in a cache; determine if the cached file has been modified; and if the cached file has been modified, communicate the cached file directly to the database.
Abstract:
A method for tracking a user's movements between network addresses can include, subsequent to a request for a (current) network address from a user, receiving the network address and an identifier for a region associated with the network address. The method can also include locating a record that contains the identifier for the region and a time that immediately precedes the request for the network address from the user. The record may further contain a prior network address. The method can further include generating an entry for a table that includes the identifier for the region, the current network address, and the prior network address. A server computer or a client computer can generate the entry. Improved accountability and improved user profile accuracy can be obtained with the method. A data processing system readable medium can comprise code that includes instructions for carrying out the method.
Abstract:
The present invention provides a system and method for file synchronization. One embodiment of the system of this invention includes a software program stored on a computer readable medium. The software program can be executed by a computer processor to receive a file from a server; store the file as a cached file in a cache; determine if the cached file has been modified; and if the cached file has been modified, communicate the cached file directly to the database.
Abstract:
Embodiments of a content delivery system are disclosed herein. In particular, an embodiment of a content delivery system may receive content associated with a first destination identifier associated with a first delivery method, determine a second destination identifier and a second delivery method associated with the first delivery destination, and deliver the content to the second destination identifier according to the second delivery method.
Abstract:
An automated rule-based system for facilitating delivery of a fax document from a source to a destination over a network where an initial delivery attempt has been unsuccessful. Rules may be stored in a database. The database may include rules based on past delivery information or new delivery instructions. When an input condition is determined, the database may be traversed to determine an action based on the set of rules. The actions may include one or more of resubmitting the fax document to the network for a next delivery attempt, cancelling the document, and identifying the destination as a technical problem. The input conditions may include an identification of non-business days and non-business hours.
Abstract:
In some embodiments, the disclosed systems and methods provide a client-server infrastructure capable of supporting a variety of asynchronous and synchronous collaboration activities in a so-called collaboration place. Some of these activities include chatting, viewing and/or editing one or more data files, and sharing one or more applications, data files, and/or displays. The client-server infrastructure supports seamless navigation between the supported asynchronous and synchronous activities in the collaboration place. Additionally, the client-server architecture supports data persistence, so that data files associated with the collaboration place can be stored for subsequent access.