摘要:
A host intercepts calls between two executables and determines whether the calls are permissible according to the host's security model which can be identify based, such as user identity based—for instance, mapping access rights within a specific data base user context to database object access. Such an identity security model differs from a common language runtime security model where managed code uses Code Access Security to prevent managed assemblies from performing certain operations. Managed assemblies registered with the host are host objects from the host's perspective for which access rights can be defined via security rules, such as are defined for individual user identities. A host can decide access between managed executables based on the host's identity based access rules by trapping any cross assembly calls and deciding whether such calls should proceed or be blocked from taking place based on the corresponding identity security settings.
摘要:
A host intercepts calls between two executables and determines whether the calls are permissible according to the host's security model which can be identify based, such as user identity based—for instance, mapping access rights within a specific data base user context to database object access. Such an identity security model differs from a common language runtime security model where managed code uses Code Access Security to prevent managed assemblies from performing certain operations. Managed assemblies registered with the host are host objects from the host's perspective for which access rights can be defined via security rules, such as are defined for individual user identities. A host can decide access between managed executables based on the host's identity based access rules by trapping any cross assembly calls and deciding whether such calls should proceed or be blocked from taking place based on the corresponding identity security settings.
摘要:
The present invention extends the reflection feature found in some virtual machines or code execution managers by providing interface mechanisms that expose unique identifiers, e.g., metadata tokens and runtime handles. These interfaces are further configured to resolve these unique identifiers to their respective member info or data structures, and vise versa. These unique identifiers remove the element of string binding/resolution, giving them more performance oriented approach to such things as the late-bound reflection/invocation found in the heavyweight features of reflection processes. In addition, these lightweight identifiers allow for enhanced performance and work set when used in analyzing the functionality associated with the corresponding member.
摘要:
The present invention relates to systems and methods that facilitate dynamic programming language execution in a managed code environment. A runtime code generator is provided within the framework of a managed object environment. The code generator includes a class allocator that reserves one or more method slots for a dynamic method call. A dynamic method builder then employs the method slots to generate an intermediate language stream that forms a method description. The method description is then fed to a Just-In-Tine (JIT) compiler that returns at least one dynamically generated pointer to facilitate execution of the dynamic method call at runtime.
摘要:
The present invention extends the reflection feature found in some virtual machines or code execution managers by providing interface mechanisms that expose unique identifiers, e.g., metadata tokens and runtime handles. These interfaces are further configured to resolve these unique identifiers to their respective member info or data structures, and vise versa. These unique identifiers remove the element of string binding/resolution, giving them more performance oriented approach to such things as the late-bound reflection/invocation found in the heavyweight features of reflection processes. In addition, these lightweight identifies allow for enhanced performance and work set when used in analyzing the functionality associated with the corresponding member.
摘要:
An exemplary method for training call center agents over a communications network using automatically selected training scenarios comprises the steps of obtaining confirmations of availability of a plurality of call center agents, determining a proctor based on proctor attributes stored in a database, selecting an agent from the plurality of agents, based on agent attributes stored in the database, to be trained by the proctor, automatically determining a training scenario based on the selected agent's attributes, and enabling the proctor and the agent to engage in the training scenario.