Abstract:
Detailed herein is a technology which, among other things, monitors the flow of events between a front-end application and a backend server. In one approach is technology, a new event is received at the backend server. This new event has an event type, which is used to set a new event flag, indicating that a new event of that type has been received. The new event is added to the queuing table. One or more events from the queuing table are selected, and a failover mechanism is maintained while selected events are being processed.
Abstract:
Workflows designed to take advantage of the capabilities of workflow-enabled application programs are disclosed. Examples of workflow-enabled application programs are word processing application programs and e-mail application programs. In response to determining that an incomplete workflow task exists, forms data is sent to a workflow-enabled application program. In response to the receipt of forms data, the workflow-enabled application program presents a workflow task form to the user of the workflow-enabled application program. Embodiments may determine whether a workflow task change or completion by a particular user at a particular time is authorized by the workflow. If a workflow task change or completion is not authorized the workflow rolls back the workflow task to a previous version of the task. Embodiments may determine if an incomplete workflow task is assigned to a group, and, if so assigned, function to prevent duplication of effort by participants in the group.
Abstract:
A method of replacing a delegate component associated with a delegate modular software component (“associate delegate component”) at software execution time, the method comprising obtaining a delegate modular software component identifier; selecting one of a plurality of candidate modular software components having a higher priority level than other of the plurality of candidate modular software components, wherein the one of the plurality of candidate modular software components has the same identifier as the delegate modular software component identifier; and replacing the associate delegate component with the one of the plurality of candidate modular software components during the execution of software including the delegate modular software component.
Abstract:
The present invention relates to compositions and methods for cancer diagnostics, prognostics and predictions, including but not limited to, cancer markers. In particular, the present invention provides perinucleolar compartments and their resident molecules as cancer markers.
Abstract:
User input to a web service including content from one or more media providers is subjected to a security analysis based on extracting whitelisted attributes and/or properties, the extracted attributes/properties validated, a template selected based on a source of the content, and a secure embedded code generated based on the whitelisted attributes/properties if the source is also a whitelisted source. The generated secure embedded code may then be provided as content by the web service.
Abstract:
Disclosed herein are systems, methods, and software for facilitating hybrid application environments. In at least one implementation, an application server within a hosting environment receives a data request initiated by a hosted application within the hosting environment. The hosted application may initiate the data request in response to a page request made on behalf of a hosted identity logged into the hosting environment. The application server generates a hybrid data request based on request information comprising at least a portion of the data request and the hosted identity and directs the hybrid data request over a connection established between the hosting environment and an enterprise environment for handling by an application server within the enterprise environment.
Abstract:
Provided herein are systems, methods, and software for facilitating hybrid application environments. In at least one implementation, an application server within a hosting environment receives a data request initiated by a hosted application within the hosting environment. The hosted application may initiate the data request in response to a page request made on behalf of a hosted identity logged into the hosting environment. The application server generates a hybrid data request based on request information comprising at least a portion of the data request and the hosted identity and directs the hybrid data request over a connection established between the hosting environment and an enterprise environment for handling by an application server within the enterprise environment.
Abstract:
The present invention relates to compositions and methods for cancer diagnostics, prognostics and predictions, including but not limited to, cancer markers. In particular, the present invention provides perinucleolar compartments and their resident molecules as cancer markers.
Abstract:
User input to a web service including content from one or more media providers is subjected to a security analysis based on extracting whitelisted attributes and/or properties, the extracted attributes/properties validated, a template selected based on a source of the content, and a secure embedded code generated based on the whitelisted attributes/properties if the source is also a whitelisted source. The generated secure embedded code may then be provided as content by the web service.
Abstract:
A method of replacing a delegate component associated with a delegate modular software component (“associate delegate component”) at software execution time, the method comprising obtaining a delegate modular software component identifier; selecting one of a plurality of candidate modular software components having a higher priority level than other of the plurality of candidate modular software components, wherein the one of the plurality of candidate modular software components has the same identifier as the delegate modular software component identifier; and replacing the associate delegate component with the one of the plurality of candidate modular software components during the execution of software including the delegate modular software component.