摘要:
Providing a rich user experience on a network client in which personal information management (PIM) data from a plurality of data sources is aggregated and displayed to the user. An aggregation system connects to data sources and maps attributes of PIM data in the data sources to a common object model. An object of aggregated PIM data is created according to the mapped attributes. The aggregation system generates user interface data representing the created object and sends the user interface data to the network client for rendering.
摘要:
Methods, systems, computer program products, and data structures for displaying data on a web browser interface where the data in its native format is not displayable on a web browser interface. A network server receives a request for content from a network device where the request includes a request for data that is not displayable on a web browser. The network server identifies a template, which will be used to transform non-displayable data into displayable content. The network server accesses non-displayable data that is stored on a data server and processes the accessed non-displayable data according to the identified template in order to transform it into displayable content. A template may include HTML code as well as customized tags. The customized tags are consumed by a rendering engine, which executes certain functions to modify the data, making it displayable content. Once transformed, displayable content is sent to the network device.
摘要:
Maintaining a plurality of application component catalogs describing user experiences associated with particular application programs. The invention includes an extensible schema for the application component catalogs and a method for matching user experiences within the application component catalogs to particular user requests. The invention provides an extensible and scalable infrastructure for customizing a user interface experience.
摘要:
A method and system for managing one or more web requests provided to a web application from a client computer. An application is responsive to a web request to generate verification data. The application sends a reply to the client to calculate a stamp as a function of the generated verification data. The application is responsive to an additional request from the client including the calculated stamp to determine if it corresponds to the generated verification data. If the calculated stamp corresponds to the generated verification data, the additional web request is submitted to the web application for processing. A Web server subject to a DOS attack will be able to distinguish between genuine users(who generate stamps) and malicious users(who will not generate stamps) and over a period of time be able to restore service to the former and deny to the latter.