摘要:
A system and computer program product for delivering tailored specific content to a mobile device. A shim application is provided to the mobile device by a content server after the mobile device visits the content server for the first time. The shim application detects the capabilities of the mobile device, such as the screen size, screen resolution, memory size, browser capabilities, etc. The shim application then includes such information in the header of the requests, such as a request for content, sent from the mobile device to the content server. The content server then generates the requested content in the appropriate format based on the information provided in the header. In this manner, the content server will now be able to ensure that the content provided by the content server for a particular mobile device will be appropriately displayed on the mobile device.
摘要:
A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.
摘要:
A communication session is established between a first device and a second device. A message is transmitted from the first device to the second device. In response to the second device failing to actively respond to the message, the first device terminates the communication session with the second device.
摘要:
A method, apparatus, and machine-readable medium to implement executable content filtering is disclosed. According to a one example embodiment, a method is provided which comprises analyzing a stream of one or more parsed elements of a network message with a set of one or more executable content filters, wherein the stream of one or more elements are streamed from a network message parser. The described method embodiment further comprises modifying the stream of one or more parsed elements to disable executable content in the network message based, at least in part, on a set of one or more rule sets being applied with the set of one or more executable content filters to the stream of parsed elements.
摘要:
A communication session is established between a first device and a second device. A message is transmitted from the first device to the second device. In response to the second device failing to actively respond to the message, the first device terminates the communication session with the second device.
摘要:
A method for managing authentication of user interface elements in a user interface can be provided. The method can include displaying a plurality of widgets in the web browser and sending an HTTP request for data to a web site, wherein the HTTP request is sent via an XMLHttpRequest API. The method can further include receiving from the web site a 401 HTTP status code associated with a custom “WWW-Authenticate” header value indicating that the HTTP request is unauthorized for communication with the web site and detecting the custom “WWW-Authenticate” header value. The method can further include displaying in a first widget of the plurality of widgets a text field for entering user credentials. The method can further include sending to the web site an HTTP request including the user credentials entered by a user, wherein the HTTP request is sent via the XMLHttpRequest API.
摘要:
Malicious executable content in network messages (e.g., request and response hypertext transfer protocol message) can circumvent some security measures. In addition, conventional security measures aimed at capturing malicious executable content noticeably impact system performance. Stream based filtering of network messages allows for efficient processing to remove malicious executable content. Furthermore, an extensible framework for executable content filtering streaming message elements allows for efficient adaptation of an executable content filter to new threats disguised as executable content.
摘要:
Embodiments of the present invention provide a method, system and computer program product for cache management in handling parallel asynchronous requests for content in a content distribution system. In an embodiment of the invention, a method for cache management method for handling parallel asynchronous requests for content in a content distribution system can include servicing multiple parallel asynchronous requests from different requesting clients for a page before all fragments in the page have been retrieved by returning previously cached ones of the fragments to the requesting clients and returning remaining ones of the fragments in the page to the requesting clients as retrieved from non-cached storage. The method further can include assembling the page once all fragments in the page have been retrieved from non-cached storage. Finally, the method can include caching the assembled page to subsequently service requests for the page.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to search engine ad placement and provide a method, system and computer program product for adaptive ad placement responsive to search terms. In one embodiment of the invention, a method for adaptive ad selection can be provided. The method can include placing both an ad and a search component within a page, auto-completing a search fragment for the search component with a keyword list, matching the keyword list to a new ad, and inserting the new ad into the page. In this regard, placing the ad within the page can include placing a default ad for the page within the page to be replaced by the new ad responsive to the auto-completion of the search component.
摘要:
A method, system and computer program product for placing data in shards on a storage device may include determining placement of a data set in one of a plurality of shards on the storage device. Each one of the shards may include a different at least one performance feature. Each different at least one performance feature may correspond to a different at least one predetermined characteristic associated with a particular set of data. The data set is cached in the one of the plurality of shards on the storage device that includes the at least one performance feature corresponding to the at least one predetermined characteristic associated with the data set being cached.