摘要:
A solution for managing a web site that includes dynamic protected data is provided. After receiving a request for a web page from a requesting system, the invention determines if the requesting system can be identified as a browser system. If not, then a public web page that does not include dynamic protected data is obtained. Otherwise, a redirect message that includes an alternative address for the web page can be provided, and a protected web page that includes the dynamic protected data can be obtained after authenticating a user.
摘要:
A solution for managing a web site that includes dynamic protected data is provided. After receiving a request for a web page from a requesting system, the invention determines if the requesting system can be identified as a browser system. If not, then a public web page that does not include dynamic protected data is obtained. Otherwise, a redirect message that includes an alternative address for the web page can be provided, and a protected web page that includes the dynamic protected data can be obtained after authenticating a user.
摘要:
A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection.
摘要:
An edge-deployed database proxy. A database access system which has been configured with the database proxy can include a universal database connectivity driver having a first exposed interface through which access to a database server can be provided; a database proxy driver registered with the universal database connectivity driver; and, a database driven application programmatically linked to the database proxy driver. Significantly, the database proxy driver can have a second exposed interface which conforms with the first exposed interface of the universal database connectivity driver. The database proxy driver further can have a configuration for invoking at least one auxiliary task in addition to providing access to the database server through the first exposed interface of the universal database connectivity driver.
摘要:
Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated.
摘要:
A method, article, and system to implement software that manages information transfer and interaction, and more particularly to providing a method, article, and system for utilizing “Forms” in a User2User (U2U) environment, such as instant messaging (IM). A “Container Aware Form” (CAF) is provided and embedded within the U2U mode, where the “Form” is aware of the endpoint container in which the user views them. In an IM application, the IM can differentiate form view format, action, and security when the same form is displayed in different IM containers. The present invention combines the benefits of U2U instant communication with information automation for all parties involved in an interaction.
摘要:
Methods, systems, and computer program products for improving the authoring of dynamic data content for Web documents (such as Web pages) by applying a content management paradigm to the representation, storage, and retrieval of the content. A transformation flow container is defined, which contains one or more transformations. A particular transformation preferably specifies either (1) a generation or retrieval of content or (2) styling for content. In the former case, executable code such as a JavaBean™ may be referenced for invocation. In the latter case, one or more style sheets may be referenced. Upon evaluating the flows in the flow container, an authored document containing dynamic data content results.
摘要:
A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection.
摘要:
Obscuring form data to be passed in forms that are sent in messages over a communications network. The form data to be obscured is removed from a form and inserted as a portion of a Uniform Resource Location (“URL”) string. The obscured form data may comprise hidden fields and/or links. An obfuscation is then applied to the portion of the URL string, thereby obscuring the information for sending on an outbound message. The original information is recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. In one aspect, the obfuscation comprises encryption. In another aspect, the obfuscation comprises creating a tiny URL that replaces the portion of the URL string.
摘要:
Mapping an application configuration, a network configuration, or both, into a problem/symptom space defining a graphical user interface so as to facilitate problem determination and resolution. Information retrieved from a knowledge base is incorporated into a graphical user interface. The knowledge base stores data pertaining to one or more symptoms of a problem, relationships of symptoms, and actions to be taken for solving the problem. The graphical user interface includes a symptom layer, a collecting layer, and a correcting layer. One or more symptoms are displayed in the symptom layer. One or more symptoms are selected from the graphical user interface. Data are gathered, analyzed, and displayed in the collecting layer in response to the selected one or more symptoms. One or more possible causes are determined for the symptoms. One or more recommended actions to be performed are determined based upon the one or more possible causes. The one or more possible causes and one or more recommended actions are displayed in the correcting layer. A determination is formulated as to whether or not the problem is resolved in response to performance of the one or more recommended actions.