摘要:
A technique to facilitate the automatic obtaining or extraction of dialogs or screens such as a graphical user interface from executable program code and saving a snapshot of such dialogs or screens in a graphical format. The executable program code is scanned or searched for particular modules within such program code that are used to generate a user interface or dialogue. Each one of these identified GUI-accessible modules is then processed in order to generate, display, and capture their associated user interface(s) or dialogue(s). Any requisite user input or sample data that is required by these modules is automatically generated and provided to assist in the generation, display, and capture of the interfaces/dialogues.
摘要:
Prefetch tags are embedded in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.
摘要:
A technique to facilitate the automatic obtaining or extraction of dialogs or screens such as a graphical user interface from executable program code and saving a snapshot of such dialogs or screens in a graphical format. The executable program code is scanned or searched for particular modules within such program code that are used to generate a user interface or dialogue. Each one of these identified GUI-accessible modules is then processed in order to generate, display, and capture their associated user interface(s) or dialogue(s). Any requisite user input or sample data that is required by these modules is automatically generated and provided to assist in the generation, display, and capture of the interfaces/dialogues.
摘要:
A method, apparatus, and computer program product for generating and displaying programming channel lists. Programming channel lists are generated and displayed according to criteria such as total number of viewers watching the programming channel.
摘要:
The present invention is a method of providing security for a conference call. The invention identifies a conference call participant as opposed to identifying a caller's telephone. The invention allows the host to selectively include or exclude specific conference call participants. The additional security is accomplished through the use of two computer programs: a host program and a caller program. In the host program, each participant selects a personal user ID and passcode. The host then selects the conference call participants from a database and enters any participation restrictions. In the caller program, the callers call into the conference calling center and attempt to access the conference call. The caller is connected to the conference call only if he enters the correct conference call ID and passcode as well as his authorized user ID and passcode. The host may then restrict the participant as indicated in the host program.
摘要:
A method, system, and program for telephony based remote location monitoring are provided. A telephone network receives the caller request to listen only to a remote location telephony device. The telephone network allocates a listen only channel between the caller telephony device and the remote location telephony device. The telephone network activates a microphone at the remote location telephony device via the listen only channel. Then, audio detected at the microphone is streamed via the listen only channel to the caller telephony device, such that the telephone network enables a caller to monitor a remote location through the remote location telephony device with minimized allocation of telephone network resources.
摘要:
A method and implementing computer system are provided for enabling management of restricted parking spaces for vehicles. In an example, a sensing system senses the presence of vehicles in predetermined parking spaces and stores that information for subsequent processing. Particular parking restrictions, or limited parking indicia, for given parking spaces are displayed and viewable to vehicle operators. The posted parking restriction indicia are selectively changeable to accommodate various parking demand situations. The displayed limited parking indicia may be changed from one type of limited parking to other types of limited (or unlimited) parking from a remote server location, either selectively by an administrator or in accordance with a stored parking authorization plan or schedule. Vehicles are scanned for proper authorization for predetermined types of parking spaces. Alarms or other notification processes are implemented to provide notification of unauthorized vehicles which are parked in restricted parking spaces.
摘要:
An application includes functionality for dynamically modifying controls based on readme documentation content after the development of the application is substantially complete. A developer marks up a documentation file to include references to graphical user interface controls. The application generates a registry that stores associations between the documentation content and the affected controls. The application then modifies the properties of the affected controls to alter presentation or at least one behavior of each affected control. When the application creates an instance of an affected control, the control includes the modified presentation or behavior.
摘要:
The present invention provides a dynamic, easily configurable system, which can be used to encrypt or otherwise hide the internal structure of a network. The present invention protects access to computing systems via a URL by encrypting all or a portion of the URL during the transmission of information over a network. Prior to the actual transmission of the information, fields in the URL can be encrypted using conventional encryption techniques. The encryption will occur after the destination has been determined such that the encryption will not cause the information to be misdirected to a wrong destination. At the destination location, there is first a determination that this URL is an encrypted URL. At this point, a decryption technique is employed based on the predetermined encryption scheme to decrypt the URL. The full URL is now accessed only by the destination location and is not accessible during travel over the network between the originating and destination locations.
摘要:
Web pages are prefetched upon activation of one of three server-side triggers: a service trigger, an access based trigger, and a timed trigger. The service trigger is a subscription service in which the web server agrees to notify the proxy when webpages in the web server are modified. The access based trigger uses logs/metrics to analyze a plurality of users' browsing habits. When the log/metrics database noticeS that a particular webpage experiences heavy requesting traffic during a particular time period, the log/metric creates an access based trigger to prefetch the requested webpage. The timed trigger is a prefetching mechanism that occurs on a regular interval. Configuration data instructs the timed trigger to prefetch a certain webpage a certain times throughout the day.