摘要:
Methods for filtering a file written in Extensible Application Markup Language (XAML) and incrementally returning the logical content contained therein to the environment, e.g., a search engine, are provided. Additionally provided are methods for extracting logical content contained in a XAML file to facilitate searching and/or indexing thereof. The methods provided permit the filtering of files containing only flow-format elements, files containing only elements representing fixed-format pages, and/or files containing both flow-format and elements representing fixed-format pages.
摘要:
Methods for filtering a file written in Extensible Application Markup Language (XAML) and incrementally returning the logical content contained therein to the environment, e.g., a search engine, are provided. Additionally provided are methods for extracting logical content contained in a XAML file to facilitate searching and/or indexing thereof. The methods provided permit the filtering of files containing only flow-format elements, files containing only elements representing fixed-format pages, and/or files containing both flow-format and elements representing fixed-format pages.
摘要:
An identification of one of multiple types of Web browsers that a Web page supports, as well as an identification of one of multiple versions of that one type of Web browser that the Web page supports, is obtained. The Web page is displayed using the identified version of the identified Web browser type. A request for an identification of the identified version of the identified Web browser type can also be received from a program, such as a Web page script. In response to the request, an identification of the identified version of the identified Web browser type is being used to display the Web page is returned, and instructions of the program are executed based at least in part on the identified version of the identified Web browser type.
摘要:
Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.
摘要:
A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
摘要:
The present visibility-aware service reduces power-intensive activities when a window associated with the visibility-aware service is not visible. The window is not visible when the window is minimized or when the window is switched from a foreground position to a background position on a display.
摘要:
The present visibility-aware service reduces power-intensive activities when a window associated with the visibility-aware service is not visible. The window is not visible when the window is minimized or when the window is switched from a foreground position to a background position on a display.
摘要:
A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
摘要:
A search authoring tool for mapping queries to assets for use in an information retrieval system has a query-to-asset mappings database, a search authoring engine, and a search evaluation engine. The query-to-asset mappings database is built from search author input and user mappings. The search authoring engine is adapted to receive operator input and to generate one or more new query-to-asset mappings based on the received operator input. The search evaluation engine is adapted to compare the one or more new query-to-asset mappings to the existing mappings to determine if the one or more new query-to-asset mappings will cause performance degradation of the information retrieval system.
摘要:
An anonymous cross-domain data request message is sent to a target domain, the request message including a cross-domain data request header. A cross-domain response message is also received from the target domain if cross-domain data requests are supported by the computing device and if the data requested by the anonymous cross-domain data request message is available for cross-domain data requests. The cross-domain response message includes a cross-domain request allowed header as well as the data requested by the anonymous cross-domain data request message. The requested data can be thoroughly examined, without restriction, by a Web page initiating the request. The target domain is a different domain than the domain that includes a Web page that requested that the anonymous cross-domain data request message be sent.