摘要:
A method of ensuring the integrity of read-only components in deployed mixed-mode applications that includes generating a digital fingerprint prior to the deployment of a mixed-mode application is discussed. The digital fingerprint is based on a read-only component in the mixed-mode application and uniquely identifies the read-only component. The method also deploys the mixed-mode application and the digital fingerprint. Additionally, the method verifies, at execution time by using the digital fingerprint, that the read-only component in the mixed-mode deployed application that served as the basis for the digital fingerprint is identical to the same read-only component originally packaged with the mixed-mode application.
摘要:
A distributed graphical presentation and manipulation application executes as a thin client application in a network. The networked graphical presentation and manipulation application can generally be used without requiring a user to install any specific software prior to using the application. In one embodiment, code may be received from a server via the network. A local environment may be generated based on the code, where the local environment may be configured to display a view of a graphical model. A request to manipulate the view may be received within the local environment. A request for a manipulated view may be transmitted to the server based on the received request. The manipulated view may be received from the server. The received manipulated view may be displayed within the local environment.
摘要:
A self-contained virtual file system is disclosed for deploying and distributing an application and/or software component. Executable files relating to the application are included in a distributable composite file. The composite file and a user front end application are deployed and distributed to an application user where the application is executed. An application provider can tag the composite file with the version information and other useful meta-data of the files for the application. The format of the composite file may support the storage of any kind of file types and associated meta-data. The composite file may contain the hierarchical directory structure of the files for the application so that the hierarchical directory structure is installed in the application user's electronic device.
摘要:
An exemplary embodiment may provide tools for creating a graphical user interface (GUI) in a first or original environment and for embedding the GUI in a second or target environment. The GUI created in the first environment may be translated into a platform independent description. A proxy GUI may be generated from the platform independent description and incorporated in the second environment.
摘要:
The present invention is directed toward automatically integrating a late bound program language into an external environment. The external environment may be an early bound environment, a late bound environment or some combination thereof. Associated with the late bound program environment is a modular execution engine and an interface mechanism, wherein the interface mechanism is capable of expressing late bound semantics in a format compatible with the external environment.
摘要:
The present invention is directed toward automatically integrating a late bound program language into an external environment. The external environment may be an early bound environment, a late bound environment or some combination thereof. Associated with the late bound program environment is a modular execution engine and an interface mechanism, wherein the interface mechanism is capable of expressing late bound semantics in a format compatible with the external environment.
摘要:
A method of ensuring the integrity of read-only components in deployed mixed-mode applications that includes generating a digital fingerprint prior to the deployment of a mixed-mode application is discussed. The digital fingerprint is based on a read-only component in the mixed-mode application and uniquely identifies the read-only component. The method also deploys the mixed-mode application and the digital fingerprint. Additionally, the method verifies, at execution time by using the digital fingerprint, that the read-only component in the mixed-mode deployed application that served as the basis for the digital fingerprint is identical to the same read-only component originally packaged with the mixed-mode application.
摘要:
Embodiments of the present application may simplify an integration of statically typed and dynamically typed languages by automatically generating an implementation of a statically typed native interface for a given set of dynamically typed functions. In an embodiment, functions in a dynamically typed language are automatically interconnected with functions in a statically typed language. Code that bridges and/or connects a statically typed interface and a dynamically typed interface embodied in the dynamically typed source code may be automatically generated. The statically typed interface may be provided by a user. Further, an extensible set of runtime rules that determine how to convert between statically typed and dynamically typed data may be provided.
摘要:
Embodiments of the present application may simplify an integration of statically typed and dynamically typed languages by automatically generating an implementation of a statically typed native interface for a given set of dynamically typed functions. In an embodiment, functions in a dynamically typed language are automatically interconnected with functions in a statically typed language. Code that bridges and/or connects a statically typed interface and a dynamically typed interface embodied in the dynamically typed source code may be automatically generated. The statically typed interface may be provided by a user. Further, an extensible set of runtime rules that determine how to convert between statically typed and dynamically typed data may be provided.
摘要:
A distributed graphical presentation and manipulation application executes as a thin client application in a network. The networked graphical presentation and manipulation application can generally be used without requiring a user to install any specific software prior to using the application. In one embodiment, code may be received from a server via the network. A local environment may be generated based on the code, where the local environment may be configured to display a view of a graphical model. A request to manipulate the view may be received within the local environment. A request for a manipulated view may be transmitted to the server based on the received request. The manipulated view may be received from the server. The received manipulated view may be displayed within the local environment.