摘要:
In one embodiment, the invention is a computing system comprising a World Wide Web application with a user interactive record field is described. The record field receives a record field entry. The application receives a context change request. Responsive to the context change request, the application dynamically transmits the record field entry to a server for storage in a database.
摘要:
Attaching files and other objects in a distributed computing environment. This includes adding file attachments and non-database objects, such as, text file data, web file data, image file data, and other file attachment objects to databases. These objects may be retrieved at the convenience of a node to which the objects are sent. Visibility rules can be set to determine which attachments and objects are seen by a node. Distribution rules for an object determine whether a node must request the object or whether the node is forced to receive the object.
摘要:
A method and system for passing information between a client, as a browser, and a server, as an application server, where the information is passed through a web server for processing between the application server and the browser. The webserver loads one or more template files. These template files contain standard markup language plus special tags. These tags are parsed, translated into commands for the application server, and sent to the application server. The application server returns the objects called to the web server, which passes the called objects to the client. The session is persistent.
摘要:
A method and system for routing intelligence information related to security. The security system provides rules that identify conditions and routing instructions that are to be applied to intelligence information. A security organization may create and modify rules to ensure the appropriate routing of intelligence information in a timely manner. The security system may receive intelligence information from various sources. Regardless of the form or source of intelligence information, the security system analyzes the intelligence information to determine whether any conditions of the rules are satisfied. When a condition of a rule is satisfied, the security system sends a notification of the intelligence information in accordance with the routing instructions for that rule. In this way, intelligence information can be automatically and quickly routed to the appropriate security personnel for further processing.
摘要:
Techniques to facilitate assignment and scheduling of activities. In accordance with a method, a chart showing a calendar of schedule for a number of available resources is provided in a first frame (or window) in a user interface menu, and a number of objects representative of a number of unplanned activities are provided in a second frame. A selection for an unplanned activity in the second frame (or a planned activity in the first frame) is received and, in response, selected ones of a number of objects in the chart are highlighted based on the selected activity. A request to assign the selected activity to a selected resource and to schedule the selected activity for a particular time duration is thereafter received. The requested assignment and scheduling may be accepted or rejected based on the requirements of the selected activity and the capabilities of the selected resource.
摘要:
In one embodiment, the invention is a computing system comprising a World Wide Web application with a user interactive record field is described. The record field receives a record field entry. The application receives a context change request. Responsive to the context change request, the application dynamically transmits the record field entry to a server for storage in a database.
摘要:
In one embodiment, a method for refining a business process model includes receiving business process data pertaining to a first phase of a business process definition from a first class of users, creating a model of a business process using the business process data received from the first class of users, receiving business process data pertaining to a second phase of the business process definition from a second class of users, and augmenting the model of the business process based on the business process data received from the second class of users. The method further includes iteratively refining the model of the business process in response to input provided by the first class of users and/or the second class of users.
摘要:
Techniques to support user interaction in a browser environment, nullcapturenull certain user actions, and perform appropriate defined actions. In a first scheme, nullsetupnull pages are used to detect user actions. Each setup page is associated with a respective script that is executed when the page is activated (e.g., via a Back or Forward button). The script performs the defined actions to obtain the proper behavior for dependent pages. The scripts for the setup pages keep track of the state of these pages, and further maintain a local history stack for the URLs of the dependent pages. In a second scheme, each dependent page includes a hidden history frame having a script that performs a set of defined actions for the page. The script further keeps track of whether or not the dependent page has been loaded previously.
摘要:
In one embodiment, a method for refining a business process model includes receiving business process data pertaining to a first phase of a business process definition from a first class of users, creating a model of a business process using the business process data received from the first class of users, receiving business process data pertaining to a second phase of the business process definition from a second class of users, and augmenting the model of the business process based on the business process data received from the second class of users. The method further includes iteratively refining the model of the business process in response to input provided by the first class of users and/or the second class of users.
摘要:
Techniques are described for exchanging data between software applications, such as project-related data between a project management software application (“PMSA”) and an unaffiliated organizational project tracking software application (“OPTSA”). A computing architecture with multiple interacting computer systems, such as a client-server architecture, can be used to allow users of remote computing systems to access project-related data and/or functionality from other computing systems, such as a thin client computing system with limited or no local capabilities to execute software applications and/or store associated application data accessing a remote central server computing system in order to interact with a PMSA executing on the server, to interact with an OPTSA executing on the server, and/or to invoke data exchange functionality available at the server for exchanging project-related data between the PMSA and OPTSA.