摘要:
A technique for converting a software program into an object oriented class for sending across a network. A software program is loaded as instance data into a single object oriented class which is self-extracting. Preferably, each program file from the software program is compressed prior to being loaded as instance data into the class. The class may be a Java class which is sent over the Internet to a Java enabled computer system, where the class is unpackaged and the original software program recreated.
摘要:
A shipping and playing adapter enables a reduced size CD to play in a full-sized CD player. The adapter comprises first and second substantially semi-circular portions constructed of a material suitable for playing in a CD player. When combined together, the first and second portions form a disk dimensioned approximately equal to a full-sized CD for receiving the reduced size CD thereon. The first and second portions may either be permanently attached along a fold line or removably attached by matching male and female parts. When combined, the first and second portions may have an inner circular surface for receiving the reduced size CD. The circular surface may be coated with a permanent or temporary adhesive. Alternatively, the first and second portions may have a center cut-out for receiving the reduced size CD therein.
摘要:
Self-testing controls are packaged together for use by a developer. The controls are enabled without the need for a custom written outside program.
摘要:
A technique for permitting a developer to be presented with a visual programming environment which includes different representations of a class library from which a developer may select classes for inclusion in an application under development. The environment includes a class window, a composition editor window, and a methods window. To permit greater understanding of the class library that the developer is working with, the class library can be presented in the class window in a class tree format, in a class list format, or in a graphical format which includes graphical representations of the classes. The developer may select a class for inclusion in the application under development from any of the three formats. The methods window is provided for displaying the methods (code) for a selected class. The methods of a class may be modified or new methods added via the methods window after the class has been added to the application under development. The composition editor window provides a graphical view of, for example, a graphical interface under development for the application, and dynamically displays to the developer at least the graphical portion of the application as it is being developed. Descriptions of added classes which do not have the visual representations may also be included in the composition editor window as they are added to the application.
摘要:
A game lobby allows users to open a game with their name at a central place so that others may see and join that game. The user can set the criteria for starting this game, such as the number of players or start time, whichever comes first. This paradigm enables a platform-independent object model without the burden of multi-user communication management by the game developer. The object model enables the development of game lobby services by multiple vendors and allows games to freely operate with any of these lobby implementations.
摘要:
A technique for converting a resource file into object oriented source code and/or an object oriented class. A standard resource file is first converted into source code for an object oriented language. The converter includes a subprocess relative to each keyword included in the resource file for converting the information associated with each keyword into a format includable in an object oriented class. Other elements of the resource file, such as the filename, are also converted as needed into the target language, and formal code required by classes in the target language is also created. The preferred target language is Java.
摘要:
Embodiments of the present invention provide a method, system and computer program product for wireless tower caching. In an embodiment of the invention, a method for wireless tower caching in a radio access network (RAN) can include receiving a response to a request from an end user device wirelessly coupled to a base station of the RAN, determining geographic positioning data for the response and identifying a most geographically wireless tower coupled to the RAN relative to the determined geographic positioning data (such as the closest wireless tower to the determined geographic positioning data). Thereafter, the response can be cached at a cache in a base station of the identified wireless tower.
摘要:
The present invention provides inter-tier failure detection using a central aggregation point. A method in accordance with an embodiment of the present invention includes: performing intra-tier failure detection in a first tier of a multi-tier system; providing a failure status to a central aggregation point in the first tier; and communicating the failure status inter-tier to a central aggregation point of a second tier of the multi-tier system.
摘要:
In a Web application testing method which has been configured in accordance with the present invention, a network message from one of several network clients can be intercepted. Session data in the network message can be identified and state information retrieved for the session in the Web application. An operation and corresponding associated parameters can be selected from a Web scenario template based upon the retrieved state information. Finally, operations can be invoked in the Web application, the operations corresponding to the operation and associated operational parameters selected from the Web scenario template.
摘要:
A method and apparatus for securing hypertext transfer protocol sessions authenticates a user's credentials before creating a session. The present invention then associates the session with the credentials. Subsequent requests are submitted with the session ID and the user credentials to be associated with the session. Therefore, an unauthorized user that has obtained a session ID cannot gain access to sensitive content associated with the session without possessing the valid credentials.