摘要:
Methods and systems for specifying the state of an application interface during configuration of the business system are provided. A state controller can manage communication between application interfaces and interface proxies. Each interface proxy replicates the services exposed by an application interface associated with backend applications in a business system. The state controller allows each application to operate in a stateful mode, a stateless mode, or a combined mode. The mode for an application can be specified during configuration/installation of the business system, removing the need to specify communication modes for applications during design and development of the applications and business system. The use of an interface proxy allows user interface (frontend) application to be developed and/or configured individually, and without regard to the communication mode used by the backend applications.
摘要:
Methods and systems for specifying the state of an application interface during configuration of the business system are provided. A state controller can manage communication between application interfaces and interface proxies. Each interface proxy replicates the services exposed by an application interface associated with backend applications in a business system. The state controller allows each application to operate in a stateful mode, a stateless mode, or a combined mode. The mode for an application can be specified during configuration/installation of the business system, removing the need to specify communication modes for applications during design and development of the applications and business system. The use of an interface proxy allows user interface (frontend) application to be developed and/or configured individually, and without regard to the communication mode used by the backend applications.
摘要:
Systems and methods are provided for dynamically selecting a locking strategy for a request by a source to use a stored data object in a computerized system. According to one implementation, a method is provided that comprises receiving, by a locking layer, a request from the source to use a stored data object, and determining, with the locking layer, a locking strategy for the request based on a set of locking configuration rules modifiable by a system administrator. The method also includes associating the request with the determined locking strategy. In some implementations, the request and locking strategy may be forwarded to a data management server, which obtains the physical locks on the data objects. The locking strategy may also be changed by the locking layer when the use of the object changes during runtime of the application.
摘要:
Methods and systems for specifying the state of an application interface during configuration of the business system are provided. A state controller can manage communication between application interfaces and interface proxies. Each interface proxy replicates the services exposed by an application interface associated with backend applications in a business system. The state controller allows each application to operate in a stateful mode, a stateless mode, or a combined mode. The mode for an application can be specified during configuration/installation of the business system, removing the need to specify communication modes for applications during design and development of the applications and business system. The use of an interface proxy allows user interface (frontend) application to be developed and/or configured individually, and without regard to the communication mode used by the backend applications.
摘要:
Methods and systems for specifying the state of an application interface during configuration of the business system are provided. A state controller can manage communication between application interfaces and interface proxies. Each interface proxy replicates the services exposed by an application interface associated with backend applications in a business system. The state controller allows each application to operate in a stateful mode, a stateless mode, or a combined mode. The mode for an application can be specified during configuration/installation of the business system, removing the need to specify communication modes for applications during design and development of the applications and business system. The use of an interface proxy allows user interface (frontend) application to be developed and/or configured individually, and without regard to the communication mode used by the backend applications.
摘要:
In a method and system for increasing security when accessing a business system, a generic hub receives a request having a first transfer protocol from a user to access an application or application data maintained in an application server. In response to the user request, the generic hub verifies the authorization of the user to access the application server. If the user is authorized, a user interface to the application is presented to the user and input data is received from the user interface. The input data is checked for validity based on application-specific metadata and type checks bound to this metadata associated with fields in the user interface, and any extraneous or non-expected data is removed from the input data. The input data and user request of a first transfer protocol are tunneled to the application using a second transfer protocol.
摘要:
A method of generating a current user interface for an application includes receiving an indication of an event, obtaining a visual component for the current user interface based on the event, and building the current user interface using the visual component. The visual component is a constituent of the current user interface that defines a function of the current user interface.
摘要:
In a method and system for increasing security when accessing a business system, a generic hub receives a request having a first transfer protocol from a user to access an application or application data maintained in an application server. In response to the user request, the generic hub verifies the authorization of the user to access the application server. If the user is authorized, a user interface to the application is presented to the user and input data is received from the user interface. The input data is checked for validity based on application-specific metadata and type checks bound to this metadata associated with fields in the user interface, and any extraneous or non-expected data is removed from the input data. The input data and user request of a first transfer protocol are tunneled to the application using a second transfer protocol.
摘要:
The disclosure provides generally systems and methods for managing and searching web services. Example software comprises computer readable instructions operable to receive a query from a first client for one or more requested web services via a graphical user interface. The software then identifies at least one web service stored in a Universal Description, Discovery, and Integration (UDDI) registry based on the query and an index of web service metadata. Information associated with the one or more identified web services is then presented via the graphical user interface.
摘要:
Generally, systems and methods for managing and searching web services are provided. Example software comprises computer readable instructions operable to receive a query from a first client for one or more requested web services via a graphical user interface. The software then identifies at least one web service stored in a Universal Description, Discovery, and Integration (UDDI) registry based on the query and an index of web service metadata. Information associated with the one or more identified web services is then presented via the graphical user interface.