摘要:
A system and method to manage a survey for a community development asset. The system includes a response repository, a sampler, a respondent profile filter, and an inference generator. The response repository stores a plurality of survey responses from survey respondents about a community development asset. The sampler selects a sample response of the plurality of survey responses. The sample response corresponds to an identified respondent. The respondent profile filter identifies a community with which the identified respondent is associated. The inference generator infers a similar response from the community associated with the identified respondent based on the sample response of the identified respondent.
摘要:
A method, system and program product are presented for enabling a session, as defined by a series of related transactions to perform a unit of work, to be created between a client and a particular server where the server is managed by a dispatcher. Modifications to the Uniform Resource Locator (URL) are used to create a method of transferring information form the client to the server. The server implements a server-side storage area (cookie jar) to temporarily store information about the client and the session so that the client is routed to the same server for successive messages in the same session and no reliance is made upon an ability by the client to store or return cookies.
摘要:
Obscuring form data to be passed in forms that are sent in messages over a communications network. The form data to be obscured is removed from a form and inserted as a portion of a Uniform Resource Location (“URL”) string. The obscured form data may comprise hidden fields and/or links. An obfuscation is then applied to the portion of the URL string, thereby obscuring the information for sending on an outbound message. The original information is recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. In one aspect, the obfuscation comprises encryption. In another aspect, the obfuscation comprises creating a tiny URL that replaces the portion of the URL string.
摘要:
A user centric policy creation and enforcement system, method and apparatus. The method can include observing state changes and action invocations in disparate applications through visual views of the applications. Correlations can be established between the observed state changes and action invocations. Rules can be formulated in a policy based upon user selected ones of the established correlations. Each of the rules can specify a state change in at least one of the applications. Each of the rules further can specify at least one resulting action invocation in at least one other of the applications. Finally, the policy can be applied so as to automatically respond to each subsequently observed state change with a specified action invocation.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a messaging session provided by a messenger, and applying an action to the business object from within the messaging session of the instant messenger. The method further can include indexing the messaging session with keywords in the message text and tags for the business object.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided. The method can include embedding a business object in message text in a chat session provided by a messenger, and applying an action to the business object from within the messaging session of the instant messenger. The method further can include generating a message transcript for the messaging session with a split view of the message text and the business object and applied action.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
摘要:
The present invention provides a method and program product for randomly relaying a protected web request from a client, through a set of peers, to a privacy proxy. Once received, the web request is proxied to a web services provider. When a provider reply is received by the privacy proxy, it is protected and relayed back through a set of peers to the client.
摘要:
Mapping an application configuration, a network configuration, or both, into a problem/symptom space defining a graphical user interface so as to facilitate problem determination and resolution. Information retrieved from a knowledge base is incorporated into a graphical user interface. The knowledge base stores data pertaining to one or more symptoms of a problem, relationships of symptoms, and actions to be taken for solving the problem. The graphical user interface includes a symptom layer, a collecting layer, and a correcting layer. One or more symptoms are displayed in the symptom layer. One or more symptoms are selected from the graphical user interface. Data are gathered, analyzed, and displayed in the collecting layer in response to the selected one or more symptoms. One or more possible causes are determined for the symptoms. One or more recommended actions to be performed are determined based upon the one or more possible causes. The one or more possible causes and one or more recommended actions are displayed in the correcting layer. A determination is formulated as to whether or not the problem is resolved in response to performance of the one or more recommended actions.
摘要:
Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.