Patent classifications
G06F9/548
Method and device for controlling access of application
A method of controlling access of an application is provided. A server receives, from a device, a request to access a hybrid operating system interface (HOSI) for managing at least one application executed respectively on different operating systems (OSs), authenticates the device based on the request received to access the HOSI, determines an application corresponding to the request received from the device, from among the at least one application, when the device is authenticated, and transmits, to the device, data according to execution of the determined application.
ACTIVITY STREAM BASED INTERACTION
An activity stream based interaction model and systems implementing such a model are disclosed. In various embodiments, a text-based tag is recognized in a received communication stream, such as an activity stream. An action indicated by text included in the tag is determined and performed in response to receiving the tag. In some embodiments, a tag to be inserted into the communication stream may be determined automatically by a machine or a process running on a machine, for example a workflow engine.
Remotely invoking dynamic classes on a computing device
A computing device that is configured for remotely invoking dynamic classes is described. The computing device includes a processor, memory in electronic communication with the processor and instructions stored in the memory. The computing device deploys one or more assemblies, which are used by an unreferenced derived class. A byte array that includes the unreferenced derived class is received from a remote node. The unreferenced derived class includes an implementation of a common base class. The computing device further receives a class name and one or more assembly names from the remote node. The computing device decodes the byte array to reconstitute the unreferenced derived class and calls the implementation of the common base class. One or more operations may be performed with the unreferenced derived class.
DIGITAL PROCESSING SYSTEMS AND METHODS FOR THIRD PARTY BLOCKS IN AUTOMATIONS IN COLLABORATIVE WORK SYSTEMS
Systems, methods, and computer-readable media for remotely automating changes to third party applications from within a primary application are disclosed. The systems and methods may involve maintaining in the primary application, a table having rows, columns, and cells at intersections of the rows and columns, wherein the primary application is configured to enable the construction of automations defined by conditional rules for altering internal information in the primary application and external information in the third party applications; receiving an automation definition conditional on specific information input into at least one specific cell in the table of the primary application, wherein the automation definition is constructed using internal blocks and external blocks, the external blocks having links to the external third party applications; monitoring the at least one specific cell of the primary application for an occurrence of the specific information.
System and method for managing an object cache
In order to optimize efficiency of serialization, a serialization cache is maintained at an object server. The serialization cache is maintained in conjunction with an object cache and stores serialized forms of objects cached within the object cache. When an object is to be sent from the server to the client, a serialization module determines if a serialized form of the object is stored in the serialization cache. If the object is already serialized within the serialization cache, the serialized form is retrieved and provided to the client. Otherwise, the object is serialized, the object is cached in the object cache and the serialized form of the object is cached in the serialization cache.
JAVA-BASED OFFLOAD SERVICE IN A MAINFRAME ENVIRONMENT
A JVM can be used as a conduit for transferring work items and results for work items between different processes/processors for a mainframe environment. The JVM provides infrastructure that allows a Java program running within the JVM to invoke native methods (e.g., assembly code methods) with a Java Native Interface (JNI). The Java program invokes a native method with the JNI to begin monitoring for work items and passes detected work items for processing to an appropriate resource, which was likely previously established. To pass a work item to a Java program, a native program code invokes Java code via the JNI that inserts a work item into the JVM address space (e.g., put the work item into a byte buffer). When the Java program obtains a work item result, the Java program invokes the native method via the JNI that writes a work item result to common storage.
Memory Model for a Layout Engine and Scripting Engine
Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine.
PROXIES FOR NATIVE CODE ACCESS
A device includes a processor coupled to a non-transitory storage device couple which may store machine instructions executable by the processor to implement a first Java Native Interface (JNI) proxy and a JNI bridge. The JNI proxy. Through the use of the JNI proxy, native code may be accessed.
TASK EXECUTION
A method may include receiving a selection of a task object for execution, the task object related to an application programming interface (API), determining whether the task object includes a placeholder value in the task object, and based on the task object including a placeholder value, producing an interface via which a user submits user input related to the placeholder value as described in the task object. The method may also include replacing the placeholder value with a new value that is based on the user input received via the interface, and generating an API call to the API in a target programming language, where the API call includes the new value. The method may also include deploying the generated API call on a target platform for execution, and obtaining results of the API call.
Refreshing security credentials used to invoke an external function
A query referencing a function associated with a remote software component is received by a network-based data warehouse system. Temporary security credentials corresponding to a role at a cloud computing service platform are obtained. The role has permission to send calls to a web endpoint corresponding to the remote software component. A request comprising input data and electronically signed using the temporary security credentials is sent to a web Application Programming Interface (API) management system of the cloud computing service platform. The request, when received by the web API management system, causes the web API management system to invoke external functionality provided by the remote software component at the web endpoint with respect to the input data. A response comprising a result of invoking the external functionality is received from the web API management system, and the result data is processed according to the query.