摘要:
A solution for managing a web site that includes dynamic protected data is provided. After receiving a request for a web page from a requesting system, the invention determines if the requesting system can be identified as a browser system. If not, then a public web page that does not include dynamic protected data is obtained. Otherwise, a redirect message that includes an alternative address for the web page can be provided, and a protected web page that includes the dynamic protected data can be obtained after authenticating a user.
摘要:
A solution for managing a web site that includes dynamic protected data is provided. After receiving a request for a web page from a requesting system, the invention determines if the requesting system can be identified as a browser system. If not, then a public web page that does not include dynamic protected data is obtained. Otherwise, a redirect message that includes an alternative address for the web page can be provided, and a protected web page that includes the dynamic protected data can be obtained after authenticating a user.
摘要:
A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection.
摘要:
Obscuring form data to be passed in forms that are sent in messages over a communications network. The form data to be obscured is removed from a form and inserted as a portion of a Uniform Resource Location (“URL”) string. The obscured form data may comprise hidden fields and/or links. An obfuscation is then applied to the portion of the URL string, thereby obscuring the information for sending on an outbound message. The original information is recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. In one aspect, the obfuscation comprises encryption. In another aspect, the obfuscation comprises creating a tiny URL that replaces the portion of the URL string.
摘要:
Mapping an application configuration, a network configuration, or both, into a problem/symptom space defining a graphical user interface so as to facilitate problem determination and resolution. Information retrieved from a knowledge base is incorporated into a graphical user interface. The knowledge base stores data pertaining to one or more symptoms of a problem, relationships of symptoms, and actions to be taken for solving the problem. The graphical user interface includes a symptom layer, a collecting layer, and a correcting layer. One or more symptoms are displayed in the symptom layer. One or more symptoms are selected from the graphical user interface. Data are gathered, analyzed, and displayed in the collecting layer in response to the selected one or more symptoms. One or more possible causes are determined for the symptoms. One or more recommended actions to be performed are determined based upon the one or more possible causes. The one or more possible causes and one or more recommended actions are displayed in the correcting layer. A determination is formulated as to whether or not the problem is resolved in response to performance of the one or more recommended actions.
摘要:
A method, system, and computer program product for efficient processing of Extensible Markup Language (XML) documents in Content Based Routing (“CBR”) networks. Specifically, the method involves converting existing XML documents to a machine-oriented notation (“mXML”) which is significantly more compact than XML, while still conveying the content and semantics of the data and the structure of the document. Documents are converted from XML to mXML upon entering a CBR subnetwork and/or upon receipt by an mXML-capable device. The documents are then processed in mXML format. Devices within the inventive system are provided with an awareness of whether target devices or processes are mXML-capable. Documents being routed to a target which is mXML-capable are passed in mXML format while documents being routed to a target which is not mXML-capable are converted to XML before they are passed.
摘要:
Systems and computer program products are provided having a plurality of arrays used to represent structured documents. The arrays include an element name array including an element name entry for each element in the structure document, an element value array including an element value entry for each element in the structured document, an attribute array including an attribute entry for each element in the structured document, a parent array including a parent entry for each element in the structured document and a child array including a child entry for each element in the structured document, The value of each parent entry identifies a parent of the element and the value of each child entry identifies zero or more children of the element.
摘要:
A method, system and computer program product for selecting and tagging content within an instant messaging (IM) session. The content is selected utilizing a contextual pointer, tagged with a subject and/or key words, then assigned a uniform resource locator (URL), and stored as an IM transcript. A search system allows the IM transcript and/or selected content to be indexed according to the tag, title, and word(s)/phrase(s) selected within the content. The IM transcript is retrieved from a location within the network via the assigned URL. IM users may assign accessibility privileges to the URL of the IM transcript, allowing selected content to be shared via a community and/or corporate network. Private access privileges may be assigned to offer full IM transcript protection.
摘要:
An edge-deployed database proxy. A database access system which has been configured with the database proxy can include a universal database connectivity driver having a first exposed interface through which access to a database server can be provided; a database proxy driver registered with the universal database connectivity driver; and, a database driven application programmatically linked to the database proxy driver. Significantly, the database proxy driver can have a second exposed interface which conforms with the first exposed interface of the universal database connectivity driver. The database proxy driver further can have a configuration for invoking at least one auxiliary task in addition to providing access to the database server through the first exposed interface of the universal database connectivity driver.
摘要:
Tasks are automated using assemblies of services. An interface component allows a user to collect services and to place selected services corresponding to a task to be automated onto a workspace. An analysis component performs an analysis of available data with regard to the selected services provided on the workspace and a configuration component automatically configures inputs of the selected services based upon the analysis of available data without intervention of the user. A dialog component is also provided to allow the user to contribute information to configure one or more of the inputs of the selected services. When processing is complete, an output component outputs a script that is executable to implement the task to be automated.