摘要:
A method and computer program product for enabling authentication of an OpenID user when a requested identity provider is unavailable. A relying party receives a login request from the OpenID user, where the login request includes a username. The relying party reads a list of trusted identity providers that are associated with the received username and selects one of those identity providers. The relying party generating an OpenID identifier using an identification (e.g., Uniform Resource Locator) of the selected identity provider and the username. The relying party transmits an authentication request (request to authenticate the OpenID user) to the selected identity provider using the formed OpenID identifier. If the selected identity provider is unavailable, then the relying party selects another identity provider from the list of identity providers that are associated with the received username and repeats the above process.
摘要:
A master and a slave computing device within a co-browsing session can be identified. The devices can be associated with a first Unified Resource Identifier (URI) where a portion of the URI is a fully qualified domain name of a Domain Name System (DNS) hierarchy. The devices can be associated with a co-browsing application. A request associated with a second URI from the master computing device can be detected. The second URI can share a root domain with the first URI. A portion of a master artifact associated with the master device can be conveyed to the slave device. The master artifact can be associated with state information of the session. A portion of a slave artifact linked to the slave device can be modified with the portion of the master artifact. The devices can be navigated to the second URI in response to the request.
摘要:
A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.
摘要:
Methods and systems of conducting co-browsing sessions may involve joining a co-browsing session with another peer device, receiving a plurality of web requests in a particular sequence from a macro, and transmitting the plurality of web requests in the particular sequence to a server associated with the co-browsing session. In one example, the particular sequence defines a navigation path to a requested resource.
摘要:
An illustrative embodiment of a computer-implemented process reports identified items of interest associated with brand associated with an identity of an entity by generating a seed document containing criteria representative of items of interest associated with a brand of a selected entity, receiving, the seed document containing the criteria into a repository to initialize the repository, wherein the repository comprises information describing branding representative of the selected entity and analyzing selected source material using the criteria in the seed document in combination with the repository, by selectively applying adapters associated with specific types of content contained within the selected source material to perform analysis including semantic analysis and pattern matching. Responsive to the analysis, identifying a set of items of interest in the selected source material that meet the criteria representative of items of interest associated with the selected entity and generating a report.
摘要:
A method for delivering tailored specific content to a mobile device. A shim application is provided to the mobile device by a content server after the mobile device visits the content server for the first time. The shim application detects the capabilities of the mobile device, such as the screen size, screen resolution, memory size, browser capabilities, etc. The shim application then includes such information in the header of the requests, such as a request for content, sent from the mobile device to the content server. The content server then generates the requested content in the appropriate format based on the information provided in the header. In this manner, the content server will now be able to ensure that the content provided by the content server for a particular mobile device will be appropriately displayed on the mobile device.
摘要:
On-demand purchase of one or more virtual image licenses when a requested virtual image placement into a cloud computing environment is (or will be) denied because sufficient license capacity is not currently available with existing licenses. Particular users are authorized in advance for on-demand purchase of new licenses for virtual image placement, and the purchase for such users occurs automatically upon detecting that the enterprise for which the placement is requested does not have sufficient license capacity. If the user requesting the placement is not authorized for on-demand license purchase, a purchase request is preferably sent automatically to a license administrator with the needed purchase authority, and the placement request is queued and then subsequently restarted when the license purchase completes.
摘要:
Techniques are described for scaling an in-memory data grid to satisfy the needs of client applications requesting data from the in-memory data grid. The in-memory data grid may monitor a variety of factors, such as data traffic or number of received queries from a particular geographical region, to determine whether to create a proximity grid. A proximity grid is an extension of the in-memory data grid that services queries originating from a defined geographic region. Each proximity grid stores data objects relevant to the proximity grid's assigned geographic region. Queries originating from the client applications within the geographic regions are then routed to the corresponding proximity grid for execution. The proximity grid may be terminated when the need of the client applications within the geographic region has subsided.
摘要:
Methods (600-900) for optimizing performance of systems (100, 200). The methods involve determining if a device (108, 1081, 1082, . . . , 108N) has been deployed as a standalone device or a cluster device. The determination can be based on a value of a flag stored in the device (e.g., an appliance) or contents of device registration information stored in a master device of a cluster of devices. The methods also involve automatically delegating data management operations to a centralized Memory Management System (MMS) or a distributed MMS (210) based on results of said determination. The centralized MMS (110) performs relational database management operations (e.g., SQL operations) in response to said data management operations being delegated thereto. The distributed MMS performs grid database management operations (e.g., non-SQL based operations or key-value based operations) in response to said data management operations being delegated thereto.
摘要:
A method for using an appropriate level of code to be executed in a runtime environment. Code in a non-Java format is translated into a Java source file. During the translation process, metadata is generated from a configuration file where the metadata includes version information of the resources (e.g., JSTL) being used by the code written in the non-Java format. A determination is made as to whether to recompile the non-Java code based on software components, referred herein as “listener components,” determining whether the versions of the resources being used by the non-Java code performs acceptably well in the runtime environment. If a listener component determines that a version of a resource being used is not acceptable, then the non-Java code is recompiled with a newer version of the resource. In this manner, an appropriate level of code is executed by the runtime environment.