摘要:
Scalable hosting of user solutions is provided. A system for hosting application software includes a local server, one or more remote servers, a configuration database and a content database. The local server includes a web front end module that processes a request from a client computer over the Internet to host application software on a server. The web front end module determines whether the local server or the one or more remote servers will host the application software. The remote server includes a back end module that manages the installation and operation of application software hosted the remote server. The configuration database includes topology information that has descriptions of the server computers that can host application software. The content database includes information on the content of the software applications to be hosted on a server computer.
摘要:
Scalable hosting of user solutions is provided. A system for hosting application software includes a local server, one or more remote servers, a configuration database and a content database. The local server includes a web front end module that processes a request from a client computer over the Internet to host application software on a server. The web front end module determines whether the local server or the one or more remote servers will host the application software. The remote server includes a back end module that manages the installation and operation of application software hosted the remote server. The configuration database includes topology information that has descriptions of the server computers that can host application software. The content database includes information on the content of the software applications to be hosted on a server computer.
摘要:
Various technologies and techniques are disclosed for increasing security in execution environments. A system is described for handling DLL calls made from untrusted code. An execution environment instantiates a lower trust process when a high trust process determines a need to call untrusted code. When the untrusted code calls a method in an original DLL, the execution environment loads a shim DLL into the lower trust process. The shim DLL has a clone of the method from the original DLL. A method for increasing security when processing calls from untrusted code is described. A shim DLL is created from an original DLL, and is deployed so an execution environment will load the shim DLL instead of the original DLL. When an execution environment receives a call from a caller DLL to the original DLL, the call is routed through the shim DLL. A pluggable validation system is also described.
摘要:
A method for recognizing strings and annotating, or labeling, the strings with a type label. After the strings are annotated with a type label, application program modules may use the type label to provide users with a choice of actions. If the user's computer does not have any actions associated with a type label, the user may be provided with the option to surf to a download Uniform Resource Locator (URL) and download action plug-ins for that type label. One or more recognizer plug-ins perform the recognition of particular strings in an electronic document. The recognizer plug-ins may be packaged with an application program module or they may be written by third parties to recognize particular strings that are of interest. One or more action plug-ins provide possible actions to be presented to the user based upon the type label associated with the string.
摘要:
A client-server architecture provides mechanisms to assist in minimizing round trips between a client and server. The architecture exposes an object model for client use that is structured similarly to the server based object model. The client batches commands and then determines when to execute the batched commands on the server. Proxy objects act as proxies for objects and serve as a way to suggest additional data retrieval operations for objects which have not been retrieved. Conditional logic and exceptions may be handled on the server without requiring additional roundtrips between the client and server.
摘要:
A location enhanced meeting service (“LEM Service”) may provide a geographical based map indicating meeting locations for a selected day. The user can view locations of meetings for a scheduled day, along with travel times. Conditions impacting travel time may be provided to the user along with updated estimated travel times and suggested alternative routes. The scale of the map may be based on the geographical diversity of the attendees. A user can view a location enhanced meeting map for particular meeting, and obtain directions to the meeting. The user can also request to view attendee's locations to the meeting on the map prior to the meeting. If an attendee is expected to be late, the user may establish a voice conference with that attendee. If a user is expected to be late to a meeting, the user may provide a notification to the other attendees of the meeting.
摘要:
A location enhanced meeting service (“LEM Service”) may provide a geographical based map indicating meeting locations for a selected day. The user can view locations of meetings for a scheduled day, along with travel times. Conditions impacting travel time may be provided to the user along with updated estimated travel times and suggested alternative routes. The scale of the map may be based on the geographical diversity of the attendees. A user can view a location enhanced meeting map for particular meeting, and obtain directions to the meeting. The user can also request to view attendee's locations to the meeting on the map prior to the meeting. If an attendee is expected to be late, the user may establish a voice conference with that attendee. If a user is expected to be late to a meeting, the user may provide a notification to the other attendees of the meeting.
摘要:
Various technologies and techniques are disclosed for restricting security levels that can be used with browser-based applications. When a request is received from an external application to retrieve data for use in a client browser, an intersection is performed on a permission set of a user of the client browser and of the external application to determine a new permission set to use for retrieving the requested data. Techniques for restricting operations of an external application that is being run in a client browser are also described. A session token is returned to a client browser after validating access can be granted to the client browser. Validation is performed to confirm access can be granted to an external application. A request for data is received from the external application, with the request for data containing the session token. The requested data is retrieved and returned to the external application.
摘要:
A method of replacing a delegate component associated with a delegate modular software component (“associate delegate component”) at software execution time, the method comprising obtaining a delegate modular software component identifier; selecting one of a plurality of candidate modular software components having a higher priority level than other of the plurality of candidate modular software components, wherein the one of the plurality of candidate modular software components has the same identifier as the delegate modular software component identifier; and replacing the associate delegate component with the one of the plurality of candidate modular software components during the execution of software including the delegate modular software component.
摘要:
A system and method is provided that allows solutions for a server farm to be submitted to a centralized location in the server farm. The submitted solutions can be selected and scheduled for automatic deployment for all servers in the server farm. Deployed solutions can be retracted from the servers in the server farm. A damaged server or a new server in the server farm can be synchronized to have the same solutions that have been deployed across the server farm.