摘要:
Systems, apparatuses and methods for use in the development of software applications or extensions to applications, user interfaces or similar products. Specifically, the invention is directed to an efficient process for developing software applications for markets in which different languages are spoken, typically as part of an internationalization strategy. The inventive systems and processes may also be used to produce software applications for a single geographic market in which multiple languages are spoken. The inventive process involves providing a development environment for software applications in which multiple users may generate customized applications based on access to a common set of applications, functional modules, translation elements, translated strings, etc. The inventive system, apparatus, and method for generating software applications in multiple languages is more efficient than presently known methods and ensures completeness and consistency of terminology in the translation into other languages.
摘要:
Systems and methods for use in enhancing the security of a system, network, device, data storage element, software application, document, account, data, structure or building. Specifically, the invention is directed to a method of determining a password time-to-live (TTL) value for a password created by a user. In one embodiment, the TTL is extended relative to a baseline or default value if the user creates a password that is expected to produce an increased level of security. Such a password may be longer, include a certain combination of characters, be judged as more complex by an appropriate algorithm, rule or heuristic, or be considered as more secure or desirable by using any other suitable measure or criteria.
摘要:
A method, system, computer program product, and related business methods are described in the context of a web-based business information system having an internal email facility, wherein e-mail communications between a native e-mail system of an end user of the web-based business information system and an external contact are facilitated and automatically tracked by the web-based business information system, the native e-mail system lying outside the web-based business information system but often being preferred by the end user over the internal e-mail facility of the web-based business information system. The described preferred embodiments provide for easy-to-use, reasonably transparent, “no-click” integration of the web-based business information system with the end user's native e-mail system in a manner that is independent of the particular type and choice of native e-mail system.
摘要:
Systems and methods for enhancing the security of confidential data such as customer email lists or similar contact information. Specifically, the invention is directed to a method of inserting a form of data referred to as a honey token into a data set when it is accessed by a user (such as an employee of the rightful owner of the data). In contrast to conventional forms of such tokens, the inventive token is dynamically generated and includes information identifying the user (i.e., the party accessing the data).
摘要:
A system architecture and related methods for controlling and/or modifying the content presented by a web site on one or more web pages. The system and methods enable an administrator or manager to efficiently update, revise, or otherwise maintain the content presented to a viewer on a web page, where such content may be subject to change or variation based on data related to the operation of a business for which the web site or web page is presented. The architecture, coupled with the methods for content or user interface representation and manipulation, enable a website administrator, manager, or other party to more efficiently control the content presented to a viewer of the site or page, where the viewer may be a customer or employee of a business.
摘要:
A system and associated methods for enabling a tenant user of a multi-tenant computing platform to introduce an extension to the platform's functions and capabilities. A computing system, such as a distributed computing service platform, may manage independent customizations and/or extensions (collectively, “extensions”) of the service platform by multiple tenants in a manner that avoids undesirable behavior that may be caused by incompatible extensions. The service may accomplish this by requiring that a proposed extension provided by a tenant or extension vendor be accompanied by a formal declaration with respect to service platform component functionality and/or service platform data objects (collectively, “service platform resources”) that are utilized and/or modified by the extension. The service may further require that the extension be accompanied by validation code (e.g., one or more modules) that is capable of verifying that particular code modules or data objects of the extension are functioning as expected.
摘要:
A system, apparatuses, and methods for enabling management of customizations/extensions to the functionality of a multi-tenant computing platform. In some embodiments, an extended or customized entity, such as a function, operation, process, module, sub-routine, data item, etc. is represented as a record. That record is then associated with an underlying record by means of a tenant specific mapping or equivalent structure. This enables the tenant to utilize the extended or customized entity in place of the underlying record in situations in which the underlying record would typically be used. This also provides a way of isolating the extensions or customizations on the multi-tenant platform so that they are associated with specific tenants and not with other tenants who may still access the underlying or un-extended versions of the entity.
摘要:
Systems, apparatuses, and methods for providing data security for data that is stored in a cloud-level platform. In one embodiment, each session is associated with specific session “keys” for use in encrypting and decrypting data. The session specific keys are generated by a client application and the client public key of a public/private key pair is provided to the cloud platform as part of a user authentication process. If the user is properly authenticated, then the platform creates its own set of keys and sends the server public key of a public/private key pair to the client. When the client requests a data record or document, the platform can determine if the user is authorized to have access to the entire data record or document or only to certain fields or portions of the record or document. Based on that determination, the platform may selectively encrypt certain fields or portions of the record or document with the client public key.
摘要:
A method for enabling a distributed computing system to tolerate system faults during the execution of a client process. The method includes instantiating an execution environment relating to the client process; executing instructions within the execution environment, the instructions causing the execution environment to issue further instructions to the distributing computing system, the further instructions relating to actions to be performed with respect to data stored on the distributed computing system. An object interface proxy receives the further instructions and monitors the received to determine if the execution environment is in a desired save-state condition; and, if so, save a current state of the execution environment in a data store.
摘要:
Systems, apparatuses, and methods for creating, editing and using notes within the context of a records database. In an embodiment, a user may create a virtual sticky note that is associated with an underlying record such that the note is displayed with the record but extraneous from any field in the business record. Further, not all notes may be seen by all users as various levels of privacy may be established for different users. Embodiments enable users to efficiently and effectively associate their comments or other inputs with a record or file that is maintained on a cloud-based or multi-tenant platform. The notes may be implemented is a cloud-based solution to track notes/comments against business records maintained on a multi-tenant platform. In one embodiment, a note creator may permit other users to specify rules or criteria that determine who or what portions of an organization may view the created notes.