US20160028808A1 - Network operating system - Google Patents
Network operating system Download PDFInfo
- Publication number
- US20160028808A1 US20160028808A1 US14/754,512 US201514754512A US2016028808A1 US 20160028808 A1 US20160028808 A1 US 20160028808A1 US 201514754512 A US201514754512 A US 201514754512A US 2016028808 A1 US2016028808 A1 US 2016028808A1
- Authority
- US
- United States
- Prior art keywords
- application
- data
- xml
- component
- instance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H04L67/2842—
-
- H04L67/42—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
- G06F9/45529—Embedded in an application, e.g. JavaScript in a Web browser
Definitions
- Computer networks configured to exchange data according to common protocols, such as the Internet Protocol (“IP”), are increasingly used to perform a variety of tasks between remote systems and users.
- IP Internet Protocol
- the connectivity available from computer networks has led organizations and others to seek solutions that facilitate participation in collaborative processes.
- many existing Web sites, network portals, and distributed applications allow users to share data and collaborate in various ways.
- resources are increasingly being made available as a service of the network.
- a service refers to software and hardware that are made accessible from the network separate from any underlying technologies. Accordingly, a network service is frequently described as being “loosely coupled” to the operating system, programming languages, and hardware components on which the service is implemented. As a result, network services may be combined to create distributed applications even though different underlying technologies are utilized.
- cloud computing is frequently used to describe the trend toward an increasing number of services being made available from the network. As network bandwidth and connectivity increases, the applications and economic incentives of cloud computing will only continue to expand.
- existing systems utilize machine-centric operating systems to manage communications over the network and facilitate collaboration. In this regard, the core design of machine-centric operating systems was established prior to the development of computer networks, such as the Internet. As a result, existing systems are unable to provide a generalized collaboration environment where network communications are readily integrated into applications and other aspects of the user experience. Instead, developing applications that facilitate sharing and participation in collaborative processes remains arduous and ultimately too difficult or expensive for most users and/or organizations. Therefore, a need exists for a network operating system that provides more effective ways of leveraging the connectivity of computer networks.
- an XML virtual machine is implemented that accepts high-level application code written in an XML programming language as input. Functionality is provided to interpret or translate the application code written in an XML programming language into code that is suitable for execution across computer platforms.
- the XML virtual machine supports the Model View Controller (MVC) design paradigm that facilitates true data abstraction from applications to a common data model. Multi-instance applications, with each instance potentially supporting multiple views, may be created and executed.
- MVC Model View Controller
- FIG. 1 is an exemplary pictorial depiction of a networking environment that includes a server-side data center and a plurality of client computers suitable for illustrating aspects of the present invention
- FIG. 2 is an exemplary pictorial depiction of a networking environment that includes a server-side data center and a plurality of client computers suitable for illustrating aspects of the present invention
- FIG. 3 is a block diagram depicting an exemplary hardware architecture of a computing device suitable for implementing aspects of the present invention
- FIGS. 4A-C are block diagrams of exemplary platform environments in which the present invention may be implemented.
- FIGS. 5A-B are exemplary block diagrams of a networking environment that includes a server-side data center and a plurality of client computers suitable for illustrating aspects of the present invention
- FIGS. 6A-B depict exemplary process and UI XML documents associated with an application suitable to illustrate aspects of the present invention
- FIGS. 7A-C depict an exemplary graphical display that visually depicts graphical elements of the application described semantically in FIGS. 6A-B ;
- FIGS. 8A-B are pictorial depictions of components suitable to illustrate aspects of the invention.
- FIG. 9 is a block diagram with exemplary managers configured to implement aspects of the present invention.
- FIGS. 10A-C are diagrams illustrating an exemplary application initiation routine that performs processing to open an application package in accordance with one embodiment of the present invention
- FIG. 11 is an exemplary flow diagram that illustrates a routine for opening and initiating execution of logic defined in an application's process code
- FIGS. 12A-B depict an exemplary flow diagram that illustrates an execute method configured to cause operations in a process step to be executed
- FIG. 13 is a diagram of an open handling routine that opens an XML document in accordance with one embodiment of the present invention.
- FIGS. 14A-14B are diagrams depicting the interactions between objects that are suitable for illustrating aspects of the present invention.
- FIGS. 15A-B illustrate an action handling routine that implements functionality in accordance with one embodiment of the present invention
- FIG. 16 is a diagram of a bind handling routine that binds an object to the data model in accordance with one embodiment of the present invention.
- FIGS. 17A-B are diagrams depicting a trigger activation routine that causes application code to be executed in response to a trigger being activated in accordance with one embodiment of the present invention
- FIG. 18 is a diagram of a decision handling routine configured to perform an evaluation directing the flow of application execution based on the evaluation
- FIG. 19 is a diagram of a change handling routine that depicts the logic for implementing a change operation in accordance with one embodiment of the present invention.
- FIGS. 20A-C are diagrams depicting a data update routine that implements logic for modifying the contents of the data model in accordance with one embodiment of the present invention
- FIG. 21 is a diagram of a set rule routine that depicts the logic for setting a component's rules in the data model in accordance with one embodiment of the present invention
- FIG. 22 is a diagram of a notify listeners routine that notifies objects of a data update in accordance with one embodiment of the present invention.
- FIG. 23 is a diagram of a rendering routine that causes an application's view to be rendered in accordance with one embodiment of the present invention.
- FIG. 24 illustrates a block diagram suitable for describing the ways in which applications interact with a variety of exemplary data sources in accordance with one embodiment of the present invention
- FIG. 25 illustrates a block diagram suitable for describing an XML file system provided by the present invention.
- FIG. 26 illustrates a message server configured to enable synchronization of data across the network in accordance with one embodiment of the present invention
- FIG. 27 illustrates additional aspects of the message server in accordance with another embodiment of the present invention.
- FIGS. 28A-28D illustrate an exemplary method for retrieving a file from a file system provided by the present invention
- FIG. 28E illustrates an excerpt of an exemplary file that is suitable for illustrating aspects of the present invention
- FIG. 29 illustrates a method configured to retrieve a list of files in accordance with one embodiment of the present invention
- FIGS. 30A-30C illustrate a method that creates a file within the XML file system in accordance with another embodiment of the present invention
- FIGS. 31A-31E illustrate a method that opens an existing file within the XML file system in accordance with another embodiment of the present invention
- FIGS. 32A-B illustrate logic used to initiate startup of the network operating system on a client computer in accordance with one embodiment of the present invention
- FIG. 33 illustrates a method for mounting a network operating system group in accordance with another embodiment of the present invention.
- FIG. 34 illustrates a method that transitions a client computer from an online state to an offline state in accordance with one embodiment of the present invention
- FIG. 35 illustrates a method of transitioning a client computer back to an online state when the client computer has been operating in an offline state in accordance with another embodiment of the present invention
- FIG. 36 illustrates a method of handling a request to create a new file in a way that facilitates enhanced network communications in accordance with another embodiment of the present invention
- FIG. 37 illustrates a shared data file utilized with a chat application that is suitable for describing additional aspects of the present invention
- FIG. 38 illustrates the relationships between components and the data model utilized by a chat application in accordance with another embodiment of the present invention.
- FIG. 39 illustrates the updating of a shared data file used to facilitate a chat conversation in accordance with another embodiment of the present invention.
- FIG. 40 illustrates an exemplary set of communications performed in a chat conversation in accordance with another embodiment of the present invention.
- FIG. 41 illustrates the use of a shared data file in performing collaborative communications between multiple clients
- FIG. 42 depicts the user interface of an exemplary application suitable for illustrating additional aspects of the present invention.
- FIG. 43 depicts the user interface of an exemplary application suitable for illustrating additional aspects of the present invention.
- aspects of the present invention are directed to a network operating system that facilitates the development of Internet-scale cloud computing.
- the network operating system described herein utilizes the XML (eXtensible Markup Language) as a general-purpose language to represent data.
- XML eXtensible Markup Language
- the examples provided below may describe functionality of the network operating system with reference to XML structured data and documents.
- many benefits and synergies are achieved by using XML in this context.
- the invention may be implemented using other underlying technologies, or combinations of technologies, than described herein without departing from the scope of the claimed subject matter.
- the illustrative examples and descriptions provided below are not intended to be exhaustive or to limit the invention to the precise forms disclosed.
- any steps described below may be interchangeable with other steps or combinations of steps in order to achieve the same result.
- the networking environment 100 includes the server-side data center 102 that is associated with the servers 104 .
- the networking environment 100 also includes a plurality of client computing devices associated with the user 112 including the mobile phone 106 , the desktop computer 108 , and the thin client 110 .
- the server-side data center 102 is configured to communicate with the mobile phone 106 , the desktop computer 108 , and the thin client 110 via the network 114 , which may be implemented as a local area network (“LAN”), wireless network, wide area network (“WAN”), such as the Internet, and the like.
- LAN local area network
- WAN wide area network
- the computing devices illustrated in FIG. 1 may be configured to exchange files, commands, and other types of data over the network 114 .
- protocols for network communication such as TCP/IP, are well known to those skilled in the art, those protocols will not be described here.
- a user's applications and data are accessible from any type of computing device that is enabled for the network operating system.
- the user 112 may connect to the network 114 from the mobile phone 106 , desktop computer 108 , or thin client 110 .
- the server-side data center 102 delivers network operating system services to the appropriate device. More specifically, a client-side component of the network operating system and user applications may be delivered and built each time the user connects to the network. Applications execute locally at the appropriate client computing device and not on the servers 104 .
- User data may be cached on a client computing device, but will persist to storage maintained by the server-side data center 102 . Accordingly, communications between the client computing devices 106 - 110 and the server-side data center 102 are principally performed to obtain documents and update data. In instances when a client goes off-line, the client-side component of the network operating system causes data updates to be cached locally. These updates may be transmitted to the server-side data center 102 and synchronized with any other changes when a network connection is re-established.
- the network operating system may provide a common experience across each of a user's computing devices.
- a common desktop application is delivered and built on disparate types of computing devices. From the common desktop, all of a user's application programs and data may be accessed. For example, a single e-mail program enabled for the network operating system may be accessed by the user 112 from any of the client computing devices 106 - 110 . Since user data is available from the server-side data center 102 and applications are delivered as a service, the same applications (e.g., email program) and data (e.g., e-mail messages) are available regardless of which computing device is being used.
- applications e.g., email program
- data e.g., e-mail messages
- the services provided by the network operating system to a client computing device may be customized depending on user preferences and other variables.
- configuration data is maintained that defines how or whether certain network operating system services will be provided.
- a user may establish preferences to have different sets of application programs or data available depending on the computing device being used.
- a user may connect to the network 114 from any number of access points including an insecure wireless connection.
- security attributes may be established so that certain services and/or data are inaccessible because of the insecure nature of the network connection.
- the examples provided above represent only some of the ways in which the network operating system services may be customized using the present invention.
- FIG. 1 illustrates the server-side data center 102 , server computers 104 , mobile phone 106 , desktop computer 108 , and thin client 110 , that are usable in the networking environment 100 in which complementary tasks may be performed by remote computing devices linked together through the network 114 .
- client computing devices such as, but not limited to laptop computers, tablet computers, personal digital assistants (PDAs), hybrid/embedded devices, set-top boxes, media centers, and the like.
- PDAs personal digital assistants
- hybrid/embedded devices set-top boxes, media centers, and the like.
- FIG. 1 illustrates the server-side data center 102 , server computers 104 , mobile phone 106 , desktop computer 108 , and thin client 110 , that are usable in the networking environment 100 in which complementary tasks may be performed by remote computing devices linked together through the network 114 .
- client computing devices such as, but not limited to laptop computers, tablet computers, personal digital assistants (PDAs), hybrid/embedded devices, set-top boxes
- the server-side data center 202 may be coupled to a private network such as the enterprise network 204 .
- additional network operating system services are provided to the clients 206 , 208 , and 210 directly over the enterprise network 204 .
- the network operating system is still provided and managed from the server-side data center 216 , the enterprise server-side data center 202 is only providing additional services.
- the same additional services may be provided to clients outside the enterprise network 204 .
- the server-side data center 202 provides network services to the client 212 over the Internet 214 .
- the clients 206 - 212 may be any computing device (mobile phone, desktop computer, thin client, etc.) enabled for the network operating system.
- the networked operating system may be provided directly by the enterprise server-side data center 202 together with its additional services and may or may not (depending on security configurations) allow access to the external server-side data center 216 outside the enterprise network 204 .
- the network operating system is configured to facilitate the participation in collaborative processes.
- One aspect of the present invention is an XML file system that serves as a network repository capable of storing any type of data including XML documents, executables, binaries, multimedia, etc.
- the XML file system may be implemented at the server-side data center 202 or 216 to manage physical storage and data access.
- the XML file system allows various types of collaboration spaces to be defined.
- the types of collaboration spaces supported include communities, groups, friends, as well as subsets within existing collaboration spaces (e.g., sub-communities, sub-groups, etc.).
- a root folder in the XML file system serves as a repository for each community, group, or other collaboration space that is created.
- folders and files may be created in the XML file system that are associated with individual users.
- collaboration between different users may be dynamically enabled without users sharing a collaboration space in the XML file system.
- messaging services are provided that allow users to generate and accept requests to establish a collaboration session in real-time. As such, users may establish new relationships through dynamically created collaboration sessions even though an existing collaboration space is not defined.
- a login prompt may be used to obtain user credentials when a client-side component of the network operating system begins executing.
- each folder associated with the user may be mapped from the XML file system as a virtual drive on the client. For example, if a user is a member of a particular group, the group folder will appear as a virtual drive on the client.
- a folder in the XML file system includes XML structured data that defines the shared resources of a collaboration space. These shared resources may include, but are not limited to, applications, data documents, access and security settings, user lists, statistics, calendar, and the like.
- the XML file system may also in one embodiment act as a repository and database substitute for one or more applications executing on the networked operating system environment.
- data maintained in the collaborative and distributed database may be automatically synchronized through transaction management provided by the present invention. By building applications utilizing this type of collaborative and distributed database, applications inherit the characteristics of the database and may readily share data.
- the server-side data center 202 follows an application programming interface (API), other embodiments of the server-side data center 202 are possible.
- other XML web services may be provided from the XML file system are desirable in cases where abstractions on top of legacy applications and databases within the enterprise is needed to be able to provide a new application or integrate multiple applications executing on the networked operating system environment.
- the customized implementations of the XML file system may choose the level of functionality to support. For example, the support for synchronizing transactions may be omitted in one level of support.
- the XML file system provides an integrated framework for creating and customizing associations between users in a way that facilitates collaboration by synchronizing data and coordinating transactional control of data updates.
- an application along with any associated user data may be shared by a group of users (e.g., friends). Both the functionality of the shared application and associated user data may be represented in XML documents maintained in the group or user folder, along with other resources.
- the XML file system provides a way for each user to access the shared application and associated user data. In this way, the shared application may be delivered and built on multiple clients with each group member manipulating data from the same group or user folder.
- clients outside the enterprise network 204 may obtain services from the server-side data center 202 .
- an employee or other user may be provided with access to enterprise resources when outside the enterprise network 204 .
- the client 212 may be a home computer, mobile phone, etc. that accesses the server-side data center 202 over the Internet 214 .
- the networking environment 200 may include additional networks than those illustrated in FIG. 2 and the exemplary configuration in FIG. 2 may be reconfigured in many ways to deliver both the network operating system and additional XML file systems in other ways.
- the network access point for the client 212 may originate from a local area network, wireless network, wide area network, etc. which may also be true for the server-side data centers 202 and 216 .
- clients may obtain different types of services from the enterprise server-side data center 202 depending on one or more variables.
- network services may be configured depending on the location of the client's network access point. For example, clients 206 - 210 that connect directly to the enterprise network 204 may be provided with additional customized services specific to the enterprise.
- external services may be delivered to the client 212 (such as a customer, supplier, employee, or other user related to the enterprise) from the server-side data center 202 .
- resources may be allocated by the server-side data center 202 for managing different types of clients. In the embodiment depicted in FIG.
- the server-side data center 202 includes the hard drive 220 that is allocated to provide customized services to the clients 206 - 210 inside the network.
- the hard drive 222 may be allocated to provide the more generalized services to clients outside the enterprise network, such as client 212 .
- the services that are provided to a client may depend on other variables such as the user credentials, settings information, type of client, and the like.
- the network operating system provides a more generalized framework for facilitating real-time “business-to-business” collaboration.
- a collaboration space may be created that allows different enterprises to access resources from a common data store.
- the client 212 may be associated with a partner enterprise to the enterprise that maintains the server-side data center 202 .
- the clients illustrated in FIG. 2 may be operated by users or software agents that interact with the server-side data center 202 .
- aspects of the invention are effectively creating an EDI (Electronic Data Interchange) relationship in which users associated with the enterprise or individually automatically share resources utilizing the XML file system.
- EDI Electronic Data Interchange
- EDI services may also be provided by the publicly available server-data center 216 , depending on security requirements.
- a group folder may be created in the XML file system that stores the shared resources of the partnership and/or defines the business rules of the EDI. Similar to the description provided above, the group folder may be mapped as a virtual drive on the client 212 , thereby providing transparent access to shared resources outside the enterprise network 204 .
- the shared application may be delivered as XML structured data from the server-side data center 202 to the clients 206 - 212 . Each of the clients 206 - 212 builds and executes the application locally, reporting data updates back to the shared folder or each users private folders in the XML file system.
- the server-side data center 202 is configured to manage data update coordination so that multiple clients may access and update the same documents simultaneously. This coordination may also be performed by the server-side data center 216 if the data is stored in its XML file system.
- the network operating system allows the clients 206 - 212 transparent access to external network services.
- a communicator may be created that abstracts the data handling functions for interacting with any (internal or external) network service.
- developers can create communicators that access network servers hosting XML Web services, REST services, XML resources, RSS or Atom feeds, text, csv text, HTML (Hypertext Markup Language) based Web sites, among others.
- an instance of a communicator or “channel” may be instantiated by the client 212 in order to interact with the Web service 218 .
- network operating system services are accessible on a public network (i.e., the Internet 214 ) to the client 212 using the server-side data center 216 as a proxy.
- the Web service 218 is accessible to the clients 206 - 210 using a communicator even though network operating services are being provided from a private network (e.g., the enterprise network 204 ).
- the server-side data center 216 serves as the proxy that manages communications between the clients 206 - 210 and the Web service 218 .
- clients may use communicators to abstract data handling functions when accessing network services. This aspect of the invention simplifies application development since developers are not required to repetitively write code for managing communications between a client and network service.
- FIG. 2 illustrates an enterprise network 204
- the present invention may facilitate data synchronization and collaboration in other types of network environments. Accordingly, the description provided with reference to FIG. 2 is equally applicable to local area networks maintained by homes and small business as well as wide area networks such as the Internet.
- the examples provided above are made with reference to a server-side data center 202 that provides distinct network services to each client 206 - 212 .
- the server-side data center 202 may be configured to provide network services that complement the resources or services of another device or network. For example, a small business may maintain a network drive for all clients connected to a local area network.
- the server-side data center 202 may provide data storage services to complement the public network drive at the server-side data center 216 by providing additional storage or allowing backup in the event that a public network device experiences a failure.
- a home network may utilize a media center computer to provide each local client access to digital media.
- a virtual drive may be provided by the server-side data center 202 to all devices connected to the home network.
- the virtual drive may be configured to allocate the actual storage of data between the media center computer and the server-side data center 202 based on user preferences or other configuration variables.
- FIG. 3 an exemplary hardware architecture of a computing device 300 will be described. While FIG. 3 is described with reference to a computing device that is implemented as a client on the network, the description below is applicable to servers and other devices that may be used to implement the present invention. Moreover, those skilled in the art and others will recognize that the computing device 300 may be any one of any number of currently available or yet to be developed devices. In its most basic configuration, the computing device 300 includes at least one central processing unit (“CPU”) 302 and a system memory 304 connected by a communication bus 306 .
- CPU central processing unit
- system memory 304 may be volatile or nonvolatile memory, such as read only memory (“ROM”), random access memory (“RAM”), EEPROM, flash memory, or similar memory technology.
- ROM read only memory
- RAM random access memory
- EEPROM electrically erasable programmable read-only memory
- flash memory or similar memory technology.
- system memory 304 typically stores data and/or program modules that are immediately accessible to and/or currently being operated on by the CPU 302 .
- the CPU 302 serves as the computational center of the computing device 300 by supporting the execution of instructions.
- the computing device 300 includes a network interface 310 comprising one or more components for communicating with other devices over the network. As described in further detail below, the present invention may access basic services that utilize the network interface 310 to perform communications using common network protocols.
- the computing device 300 also includes a storage medium 308 .
- network operating system services may be accessed using a computing device that does not include means for persisting data to a local storage medium. Therefore, the storage medium 308 depicted in FIG. 3 is represented with a dashed line to indicate that the storage medium 308 is optional.
- the storage medium 308 may be volatile or nonvolatile, removable or nonremovable, implemented using any technology capable of storing information such as, but not limited to, a hard drive, solid state drive, CD-ROM, DVD, or other disk storage, magnetic cassettes, magnetic tape, magnetic disk storage, and the like.
- computer readable media includes volatile and non-volatile and removable and non-removable media implemented in any method or technology capable of storing information, such as computer-readable instructions, data structures, program modules, or other data.
- system memory 304 and storage medium 308 depicted in FIG. 3 are merely examples of computer readable media.
- FIG. 3 does not show some of the typical components of many computing devices.
- the computing device 300 will typically include input devices, such as a keyboard, mouse, microphone, touch input device, etc.
- the computing device 300 may also include output devices such as a display, speakers, printer, etc. Since all these devices are well known in the art, they are not described here.
- FIGS. 4A-4C illustrate the hierarchical relationships between platform layers of the computing device 300 ( FIG. 3 ). More specifically, the platform layers of the computing device 300 illustrated in FIGS. 4A-B include a hardware platform 402 on the bottom layer, a machine operating system 404 in the middle layer, and an application platform 406 on the top layer.
- the platform layers of the computing device 300 depicted in FIGS. 4A-4C are merely exemplary.
- the computing device 300 may include a machine operating system 404 .
- the machine operating system 404 may be from any of the family of general-purpose operating systems configured to utilize generic hardware such as Microsoft® operating systems, Apple® operating systems, UNIX® operating systems, Linux® operating system, Nokia® Symbian, Google® Android, etc.
- the machine operating system 404 may be an operating system configured for specialized computing devices that use non-generic hardware such as thin clients, mobile phones, mainframes, supercomputers, and the like.
- the machine operating system 404 may be an operating system designed to satisfy certain configuration parameters such as real-time operating systems, embedded operating systems, etc.
- machine operating systems One purpose of machine operating systems is to abstract the details of accessing and otherwise utilizing hardware resources. Accordingly, machine operating systems almost all perform basic system tasks, such as managing I/O (input and output) with hardware components, memory management, task scheduling, etc.
- machine operating systems typically offer services to application programs through an API. Providing services through an API relieves application developers from having to manage the implementation details of accessing or otherwise utilizing an underlying computer platform.
- aspects of the present invention use the machine operating system 404 only for basic services that are available from all modern computer platforms. In this regard, services may be utilized for interfacing with networking hardware and establishing a network connection to communicate using TCP/IP protocols.
- the computing device 300 includes a Web browser 408 that operates at the top layer of the application platform 406 .
- a client-side component 410 of the network operating system may be delivered and built on the computing device 300 .
- the client-side component 410 is configured to operate within the context of the Web browser 408 .
- the Web browser 408 may be any number of browser applications configured to communicate with remote devices using TCP/IP network communication protocols including, but not limited to, Mozilla Firefox®, Microsoft's Internet Explorer®, and the like.
- the client-side component 410 does not directly interact with the machine operating system 404 . Instead, basic services used by the client-side component 410 are accessed from the Web browser 408 .
- HTTP is a higher-level protocol than TCP/IP that, among other things, allows network resources to be requested/received using a Uniform Resource Locator (“URL”).
- URL Uniform Resource Locator
- Web browsers generate HTTP requests in order to obtain Web pages formatted in a markup language such as the Hypertext Markup Language (HTML), eXtensible Markup Language (XML) or formatted using JSON (“Java Script Object Notation”) and/or JavaScript.
- the Web browser 408 is used by the client-side component 410 of the network operating system to perform network communications using HTTP and for rendering graphical elements that are represented in HTML among other graphical representation technologies available from Web browsers.
- the client-side component 410 of the network operating system directly accesses the services of the machine operating system 404 without using a Web browser.
- aspects of the present invention allow applications to be delivered and built on disparate types of computing devices.
- Web browsers are typically configured to display graphical elements according to a pre-determined page size and/or layout.
- a general-purpose Web browser may not be well-suited for rendering graphical elements on every type of computing device in which the present invention may be implemented.
- using a Web browser to render graphical elements on a small form factor computing device may be problematic.
- the pre-determined page size and/or layout anticipated by the Web browser may be too large or otherwise inappropriate given the available form factor. As illustrated in FIG.
- the client-side component 410 of the network operating system may be implemented as a stand-alone application, or even as a machine operating system.
- the client-side component 410 is configured to perform graphical rendering in a way that is appropriate given the form factor of the computing device 300 without using a Web browser.
- basic services for performing network communications are obtained directly from the machine operating system 404 or built into the client-side component 410 .
- the computing device 300 does not include a traditional machine operating system. Instead, basic services for interacting with the hardware platform 402 are built into the client-side component 410 .
- the client-side component 410 implements basic system tasks for performing memory management, task scheduling, and the like.
- aspects of the present invention may be readily customized and deployed for use with particular hardware platforms.
- the client-side component 410 may be configured to be independent from the services offered by providers of machine operating systems.
- the client-side component 410 may be delivered as a network service and built each time a user connects to the network. As illustrated in FIGS. 4A-4C , the client-side component 410 is suitable for being implemented as a stand-alone application, a machine operating system, or within the context of a Web browser. In all of these embodiments, the server-side data center 202 or 216 may provide application logic to the client-side component 410 as a service of the network. Accordingly, a limited resource computing device that does not have a storage medium (e.g., hard drive, CD-ROM, DVD, etc.) may be used to access network operating system services provided by the present invention.
- a storage medium e.g., hard drive, CD-ROM, DVD, etc.
- the client-side component 410 and other network operating system data may be cached in system memory (ROM, RAM, etc.) without persisting to a local storage medium.
- applications enabled for the network operating system do not need to be “installed” on the computing device 300 as applications may be delivered as a service.
- a description of how a common data model may be used to deliver network operating system services in accordance with the present invention is provided.
- the network operating system supports the Model View Controller (MVC) design paradigm by separating application components into different layers, namely, a model, view, and controller.
- MVC Model View Controller
- XML documents are the “model” or common data format in which information is represented in the network operating system environment. Utilizing a common data model (e.g., the XML document) in this context results in many benefits, as will be clear in the description that follows.
- the networking environment 500 depicted in FIGS. 5A-5B includes the server-side data center 502 that is communicatively connected to each of the clients 504 and 506 via the network 508 .
- the client-side component of the network operating system may be dynamically delivered to each of the clients 504 and 506 from the server-side data center 502 or be locally installed on either of the clients 504 and 506 .
- the client-side component of the network operating system provides an XML virtual machine 510 that interprets or causes XML structured applications to be executed on the clients 504 and 506 .
- aspects of the present invention cause the network operating system to “boot” by delivering a process XML document from the server-side data center 502 .
- the process XML document provides the logic that describes a startup-sequence for the clients 504 and 506 . As described in further detail below, this process XML document will be executed within the XML virtual machine 510 .
- the startup-sequence typically instantiates and manipulates a set of objects within the XML virtual machine 510 so that other applications may be executed.
- XML may serve as the “model” or common format in which application logic and other data is represented in the network operating system environment, but other models, data formats, and structuring of data may also be utilized to implement the invention.
- XML programming languages that allow applications to be designed at a very high level of abstraction are provided.
- XML is a highly structured, transferable, and transformable language.
- representing application logic at a high abstraction level as XML structured data is memory efficient and results in compact applications.
- a platform is provided for executing an application's logic represented in one or more well-formed XML documents. Application functionality is separated according to the MVC design paradigm thereby eliminating repetitive tasks performed by traditional systems.
- transmission of application code from the server-side data center 502 to the clients 504 and 506 consumes a small amount of bandwidth when compared to existing systems.
- execution of the application logic using the present invention either eliminates or greatly reduces the bandwidth consumed, since application logic is executed using the XML virtual machine 510 .
- Interactions that would have otherwise been handled by performing a server “round-trip” is handled directly on the clients 504 or 506 without having to request or otherwise rely on network communications with the server-side data center 502 .
- One aspect of the present invention is an XML virtual machine 510 that provides the clients 504 and 506 a platform and application programming interface (API) for executing and developing applications.
- high-level application code written in an XML programming language is accepted as input and executed locally on the clients 504 and 506 by the XML virtual machine 510 .
- Functionality is provided to interpret or translate the high-level application code into interpretable code, byte code, or other lower-level language that is suitable for execution on any platform.
- the XML virtual machine 510 abstracts the underlying computer platform and network resources so that applications may be executed in the same way on any type of computing device.
- the XML virtual machine 510 is completely platform and hardware independent and can be implemented using any number of currently available, or yet to be developed, programming technologies, such as, but not limited to, Microsoft .NET®, Java, C, C++, HTML, JavaScript, AJAX, Adobe® Flash, Microsoft® SilverLight, and the like.
- the networking environment 500 illustrated in FIG. 5B includes the same components described above with reference to FIG. 5A .
- an XML file system 512 that provides storage and other network services is depicted on the server-side data center 502 . Accordingly, data maintained in the XML file system 512 may be accessed by the clients 504 and 506 when network operating system services are being provided.
- the present invention implements a client-side cache 514 for managing the storage of documents and other run-time data on the clients 504 and 506 . As illustrated in FIG.
- data stored in the client-side cache 514 is readily accessible to the XML virtual machine 510 .
- the client-side cache 514 enables the XML virtual machine 510 to continue executing applications even if the network connection is temporarily unavailable or if a client 504 or 506 goes offline.
- applications executing on the clients 504 and 506 may continue to operate offline when a user is on a bus, train or airplane and other instances when a network connection is unavailable.
- data changes performed on the clients 504 or 506 will be synchronized to the XML file system 512 residing on the server-side data center 512 when the network connection is re-established.
- the present invention provides programming languages that allow developers to create applications at a very high level of abstraction.
- these programming languages include a process XML language, a user interface (“UI”) XML language, and an application package XML language.
- Application code written in these programming languages is suitable to be represented as XML structured data and stored in XML documents.
- the process XML document 516 , user interface XML document 518 , and application package XML document 520 contain application code written in these programming languages, respectively.
- an application may be defined in one or more XML documents maintained at the server-side data center 502 .
- an application will typically utilize data documents such as the data XML document 522 also maintained at the server-side data center 502 .
- These XML documents 516 - 522 may be accessed by the clients 504 and 506 on demand so that applications may be executed using the XML virtual machine 510 .
- the UI XML language is used to define an application's “view” in the MVC design paradigm.
- markup languages were originally developed to describe the layout of Web pages in a way that allowed the pages to be rendered by a Web browser.
- the structured nature of markup languages allowed the appearance of Web pages to be modified without affecting the implementation of the Web browser or other related technologies.
- the UI XML language defines the appearance and behavior of an application user interface in accordance with a schema that complies with XML syntax.
- developers may create applications with the same graphical elements (i.e., menus, toolbars, drop-down boxes, and the like) that exist in common desktop applications.
- the UI XML language is suitable for developing user interfaces that work across different platforms.
- user interfaces and behavior described in the UI XML language describe these elements in accordance with the XML syntax at a higher-level of abstraction in accordance with the MVC design paradigm. Accordingly, user interfaces and behavior described in the UI XML language may be readily transformed or otherwise modified without impacting other systems.
- This ability to transform the UI XML language allows an application's functionality to be customized based on one or more variables. For example, a transform may be defined to reduce or eliminate certain aspects of application functionality depending on the type of device being utilized. By way of another example, a transform may be defined on the UI XML language to remove or restrict certain functionality depending on user access credentials or for localizing applications for different languages and/or markets.
- the process XML language is used to define the “controller” component of an application in the MVC design paradigm.
- the process XML language allows developers to describe the logic of an application in a set of process steps. Each process step contains one or more operations that are approximately equivalent to instructions and/or method calls in a traditional programming languages.
- the process XML language is used as the controller or glue between the user interface (“View”) logic and the XML data (“Model”). Accordingly, aspects of the invention enable application logic to be described using the process XML language at a higher abstraction level than traditional programming languages.
- the user interface logic (“View”) is completely separated from the process XML logic (“Controller”).
- the data handling functions that comprise the majority of application code in existing systems is automatically handled by the present invention.
- intelligent data bindings may be defined between the view logic and the data model.
- the I/O (input and output) or data both to the data model cached locally and to the remote file system and any remote listeners is automatically handled by the network operating system. Since developers do not provide data handling logic, the applications created using the process XML language are frequently developed more quickly and include less application code than traditional applications.
- the process XML language provides other advantages for creating and distributing applications in a networking environment, than described with reference to FIG. 5A .
- an application package XML language is also provided.
- the application package XML language allows developers to describe the resources utilized by an application.
- the UI and process XML documents that define an application's functionality may be identified in an application package.
- Logic in the application package allows developers to package and distribute an application's resources to clients in a controlled and secure manner.
- the use of an application package allows multiple instances of the application to be created in a way that enables the XML virtual machine 510 to ensure intra-application security.
- the present invention provides improved methods for distributing applications and software updates in a networking environment.
- an application is typically distributed in an executable format that, when executed, “installs” the application on a computing device.
- An executable typically represents application logic as machine instructions that are specific to a particular computing platform.
- an executable is a memory-intensive representation of an application that consumes a relatively large amount of bandwidth when distributed in a networking environment. Accordingly, complex and resource-intensive systems are required to distribute and install applications using executables.
- Improved methods for distributing applications and software updates over the network are integrated into the network operating system.
- An application enabled for the network operating system is not “installed” on a client computing device using an executable. Instead, the present invention allows application logic to be represented entirely in XML structured data.
- an application as represented in one or more XML documents may be obtained automatically from a service provider, which may provide the XML documents from a local/private server or any Web server on the Internet.
- a service provider which may provide the XML documents from a local/private server or any Web server on the Internet.
- an integrated framework is provided for distributing applications to clients over the network.
- updates such as “patches” and more recent versions of an application may also propagate automatically to clients.
- any modifications to the XML documents will also propagate to clients as a network service.
- application logic may be synchronized across the network the same was as any other data.
- the XML virtual machine 510 and XML file system 512 are configured to synchronize data and coordinate changes through transaction handling, changes to applications may be performed in real-time and in a collaborative manner. For example, an application maintained in a shared folder may be opened and executed on the client 504 . Concurrently, a user associated with the client 506 could modify the application logic and have the changes automatically propagated to the client 504 . The changes to application logic would be implemented in real-time and therefore be readily observed on the client 504 as the changes occur.
- an XML representation of an application is distributed by a service provider and executed on the client using the XML virtual machine.
- clients may continue to execute applications “off-line” without requiring runtime processing from the server-side.
- XML documents representing one or more applications are cached in memory on the client.
- the XML virtual machine may access these cached XML documents to continue executing applications without having a network connection.
- data updates that occur off-line are also cached and transmitted to the server-side when a network connection is re-established.
- the present invention provides network operating system services without requiring virtualization of computer resources.
- a number of technologies for virtualizing computer resources are being used to provide network services, such as “cloud” storage.
- these virtualization technologies abstract computer resources that are typically associated with a server away from underlying platforms.
- the abstracted resources are typically encapsulated in a platform independent interface suitable to be accessed from the network.
- the computer resources that may be abstracted include applications, hardware, desktops, machine operating systems, and the like.
- complex systems are required to abstract and encapsulate computer resources in this way.
- a virtualization layer that simulates a servers underlying hardware and has at least some impact on performance may be required.
- these virtualization technologies promote a server-centric model that shifts the location where resources are implemented and executed to the server-side.
- the increased processing and other demands placed on servers may not scale when network services are provided to an ever-increasing number of users.
- using virtualization technologies to implement a network service may require a consolidated data center in which an oversupply of servers are needed to ensure that the service is available on demand.
- virtualization technologies consume more bandwidth and result in a slower user experience since application logic is executed on a remote server and not directly on the client. This will also result in applications being unavailable when the network connection goes down or the client goes “off-line.”
- a more-scalable architecture is provided that allows network services to be accessed by an ever-increasing number of users.
- XML virtual machine By using the XML virtual machine to execute applications on the client-side, processing and other resources from clients are more fully utilized.
- This implementation provides a more-scalable architecture because a natural correspondence exists between the number of users accessing a network service, bandwidth usage, processing power, and other resources that are available from the client-side to execute application logic.
- executing applications on the client using the XML virtual machine allows application functionality to be readily accessed by users while “off-line.”
- applications and user data represented in one or more XML documents may be stored in a client-side cache. Accordingly, all of an application's logic is available and may be executed using data in the cache, regardless of whether an active network connection exists.
- an application may not access network resources while “off-line” and may need to reestablish a network connection to implement all of the application's functionality.
- the “off-line” functionality provided when a network service is implemented using virtualization technologies is more limited.
- some existing network services implement an “off-line” mode where users may continue to interact with an application used to access a network service.
- an executable or other lower-level representation of an application is distributed and installed on the client.
- this lower-level representation of the application is executed locally.
- installing applications on the client to provide this “off-line” functionality may not be feasible or convenient.
- a limited resource computing device may not have sufficient storage to “install” an executable or other lower-level representation of an application.
- the functionality available on a client without an active network connection is limited to those applications that have been installed locally.
- a client may not have sufficient computing resources (storage, memory, bandwidth, etc.) to install each desired application using an executable or other low-level representation of the application.
- the present invention implements improved methods for accessing network services over mobile, wireless, or unstable networks.
- mobile or wireless networks are less reliable and bandwidth-constrained when compared to wired networks.
- Providing programming languages that represent application logic as XML structured data and an XML virtual machine 510 configured to automatically perform repetitive data handling functions results in highly compact and memory efficient applications.
- applications are able to share the functionality of the XML virtual machine 510 and reuse objects when implementing application logic.
- distributing applications enabled for the network operating system consumes a fraction of the bandwidth when compared to existing application distribution systems.
- the present invention allows XML representations of applications to be maintained in a client-side cache and executed locally using the XML virtual machine 510 . Since application logic and data may be cached locally, a continuous network connection may not be necessary. Instead, the present invention is well-suited to providing access to network services over wireless networks in which network connectivity may be intermittent. Moreover, since applications are executed locally, more reliable network services with a certain guarantee of service may be provided. For example, the present invention is also well-suited for providing enterprise class applications as a service of the network such as the Internet. In this regard, those skilled in the art and others will recognize that enterprise class applications may need to be accessible within the enterprise even if the network connection is temporarily unavailable or the quality of the Internet connection affects access to the network. The invention described herein solves this problem.
- XML is an extensible language that provides a foundation for the creation of additional languages.
- An XML document has a hierarchical tree structure, where the root of the tree identifies the document and other nodes in the document are descendents of the root. Nodes of the tree may contain document content, as well as data that defines the structure of the content.
- elements and their associated attributes may be defined to establish other semantic constraints on the structure and content of an XML document.
- the present invention implements schemas or vocabularies that apply additional semantic constraints over those imposed by XML.
- developers represent an application's logic semantically in accordance with the MVC design paradigm.
- the MVC design paradigm was originally implemented in the Smalltalk programming language and has since been used in other engineering contexts. Those skilled in the art and others will recognize that the MVC design paradigm is merely descriptive of a general architectural paradigm for separating functionality into layers. As such, the MVC design paradigm is implemented in various contexts to eliminate dependencies and support platform independence. By way of example, existing systems used to store HTML data, gather dynamic Web page content, and render a Web page are frequently described as adhering to the MVC design paradigm. Moreover, development environments used to create Web applications may separate functionality into layers according to the MVC design paradigm. In this context, the graphical user interface of the Web application is separated from a data model to support more modular application development. However, these existing systems implement functionality and utilize an underlying data model that is more domain-specific than the present invention.
- aspects of the present invention allow any type of application to be created in accordance with the MVC design paradigm.
- separation of the user interface from logic and the underlying data model is not limited to Web applications, Web pages, and the like.
- Multi-instance applications with each instance potentially supporting multiple views, may be created and executed in the network operating system environment.
- these application instances each manipulate data from a common data model. Since developers do not have to provide program logic for setting and accessing data from the data model and managing synchronization and data exchange between the user interface (“View”) and data model, application development is greatly simplified.
- FIG. 6A depicts an exemplary process XML document 600 (“MyTasks.xml”) that provides a semantic description of the controller logic for a “MyTasks” application.
- MyTasks.xml exemplary process XML document 600
- the MyTasks.xml document 600 includes a trigger 602 defined in the “ ⁇ trigger>” XML element.
- This trigger 602 maintains a set of attributes including the view, component, event, and step attributes.
- application logic written in the process XML language may define a sequence of process steps.
- the MyTasks.xml document 600 includes a plurality of process steps 604 - 610 delineated by the “ ⁇ step>” XML elements. As depicted in FIG. 6A , two attributes are associated with each of the process steps 604 - 610 including a number attribute (“id”) and a name attribute. Within each process step, at least one operation is defined.
- the process step 604 associated with the name attribute “Initialize Application” includes three operations 612 - 616 that are delineated by the “ ⁇ operation>” XML elements.
- FIG. 6B depicts an excerpt from a UI XML document (“MyTasks_gui.xml”) that provides a semantic description of exemplary “view” logic for the MyTasks application.
- the MyTasks_gui.xml document 650 includes two button components 652 and 654 delineated by the “ ⁇ button>” XML elements. Each button element maintains a set of attributes including the name, text, and width attributes.
- the MyTasks_gui.xml document 650 includes two input components 656 and 658 delineated by the “ ⁇ input>” XML elements. In this example, the input components 656 and 658 maintain a set of attributes that include the name, width, and height attributes.
- aspects of the invention that serve as the XML virtual machine may begin interpreting the MyTasks.xml document 600 .
- application logic is interpreted one statement at a time, rather than being compiled in its entirety before execution.
- application code written in the XML languages provided by the present invention may be compiled into executable code or byte code in alternative embodiments.
- the MyTasks.xml document 600 defines a trigger 602 that identifies a process step 606 in the application that will be executed in response to activation of the trigger.
- the trigger 602 is registered so that flow may be directed to the appropriate process step 606 in response to the activation of the trigger.
- the application defines a default process step 604 with the name attribute “Initialize Application” where flow of control is directed once any triggers in the application have been registered.
- the operation 612 with the name attribute “open” and the value attribute “apps/mytasks_gui.xml” is the first operation in the Initialize Application process step 604 that will be executed. Execution of the Open operation 612 will cause the view of the application as represented in the MyTasks_gui.xml document 650 to be interpreted and rendered on a computer display.
- the application's view includes the components 652 - 658 defined semantically in the MyTasks_gui.xml document 650 .
- execution will proceed to the operation 614 with the name attribute “action” and the value attribute “#MyTasks.”
- execution of the Action operation 614 will cause the button component 654 to be hidden from view once the MyTasks_gui.xml document 650 has been opened.
- the graphical display 700 depicted in FIG. 7A includes the Button1 component 702 and the Button2 component 704 that correspond to the button components 652 - 654 described semantically in the MyTasks_gui.xml document 650 .
- the graphical display 700 includes the Input3 component 706 and Input4 component 708 that correspond to the semantic description of the input components 656 - 658 , respectively.
- the graphical display 700 in FIG. 7A represents a visual depiction of the MyTasks_gui.xml document 650 .
- the process logic in the MyTasks.xml document 600 causes the Button2 component 704 to be hidden when the MyTasks application is launched. Accordingly, the Button2 component 704 is depicted in FIG. 7A with a dashed line to indicate that the Button2 component 704 is not initially visible to the user subsequent to execution of the Action operation 614 .
- the exemplary MyTasks application is configured to display a list of task descriptions that are stored in a “data/tasks.xml” document. More specifically, task descriptions will be displayed in the Input3 component 706 by default when the application is launched.
- a user may modify the task list by directly interacting with the Input3 component 706 and changing entries of task descriptions.
- the user may input a new task description into the Input4 component 708 and activate the trigger 602 by selecting the Button1 component 702 . If valid input is received, the new task description is added to the “data/tasks.xml” document and automatically displayed by the Input3 component 706 . Conversely, if the user merely selects the Button1 component 702 without providing any input into the Input4 component 708 , the Button2 component 704 is displayed with text requesting that the user provide a valid task description.
- the operation 616 with the name attribute “bind” and the value attribute “data/tasks.xml” is the next operation in the Initialize Application process step 604 that will be executed.
- execution of the Bind operation 616 will cause the Input3 component 706 to become a data binding component that displays a list of task descriptions.
- the logic provided in the Bind operation 616 and its associated component element 618 binds the Input3 component 706 to a list of task descriptions represented in the “data/tasks.xml” document.
- a task is defined within the “data/tasks.xml” document as an element that maintains an associated description attribute.
- the logic provided by the component element 618 selects the “/tasks/task/@description” attribute of the task element for display in the Input3 component 706 .
- the Bind operation 616 is the last operation in the Initialize Application process step 604 that is executed.
- FIG. 7B depicts the same button and input components 702 - 708 described above with reference to FIG. 7A .
- a set of task descriptions is displayed by the Input3 component 706 .
- the Input3 component 706 is bound to description attributes of task elements defined in the “data/tasks.xml” document. Accordingly, after the Bind operation 616 is executed, the values assigned to these task descriptions, as represented in the data model (e.g., document object 710 ), are displayed in the Input3 component 706 .
- the MyTasks application defines a trigger 602 that directs the flow of execution to process step “2” when the Button1 component 702 experiences a “select” event. Accordingly, the trigger 602 directs the flow of execution to the process step 606 entitled “Press Button” in response to the Button1 component 702 being selected.
- the operation 620 with the name attribute “decision” and the value attribute “#MyTasks#input4” is the operation in the Press Button process step 606 that will be executed.
- the decision operation 620 performs a test to determine whether any text was entered into the Input4 component 708 when the Button1 component 702 was selected.
- the logic within the “ ⁇ when>” XML element 622 directs the flow of execution to process step 608 if text was entered into the Input4 component 708 when the Button1 component 702 was selected.
- the decision operation 620 causes the flow of execution to proceed to process step 610 if text was not entered in the Input4 component 708 upon the occurrence of the trigger.
- the flow of execution proceeds to the “Add Task” process step 608 .
- the operation 624 with the name attribute “change” and the value attribute “data/tasks.xml” is the next operation that would be executed.
- the change operation 624 will cause a new task element with the appropriate description attribute to be added to the “data/tasks.xml” document.
- the “ ⁇ store>” XML element 626 within the change operation 624 provides logic that causes the text entered in the Input4 component 708 to be stored in the description attribute of the new task.
- FIG. 7C the state of the graphical display 700 subsequent to the entry of a new task and the selection of the Button1 component 702 is depicted. Accordingly, FIG. 7C includes the same components 702 - 708 as described above with reference to FIGS. 7A-B .
- the user entered the text “purchase airline tickets” into the text area provided by the Input4 component 708 .
- the change operation 624 described above would add the value of this task description to the “data/tasks.xml” document utilizing the corresponding document object 710 .
- the Input3 component 706 is bound to a selection of description attributes affected by the change operation 624 , the list of tasks displayed by the Input3 component 706 is updated automatically in the document object 710 . In other words, developers do not have to provide application code for handling the synchronization and exchange of data between the Input3 component 706 and the data model.
- the user may input a new task description into the Input4 component 708 and update the task list by selecting the Button1 component 702 .
- a user may modify the task descriptions by directly interacting with entries that are displayed in the Input3 component 706 .
- the user may delete the “update presentation” task description currently being displayed by the Input3 component 706 . Since a data binding is defined, the deletion would automatically propagate to the “data/tasks.xml” document.
- one or more components and/or local or remote applications may be data listeners to the task descriptions represented in the “data/tasks.xml” document.
- Each of the local data listeners would be notified and updated by the document object 710 in response to the “update presentation” task being deleted. Significantly, the deletion of the task would propagate to the underlying data model and then to any data listeners over the network without a developer being required to provide application code for handling the data update.
- the MyTasks application described with reference to FIGS. 6A-7C is a highly simplified example of one application that may be used illustrate aspects of the present invention. Additional applications may be created and executed in the network operating system environment. Accordingly, the examples and description made with reference to the MyTasks application herein should be construed as exemplary.
- the network operating system provides an automated communication path between the user interface and an underlying data model to support execution of applications that adhere to the MVC design paradigm.
- developers may define a binding between a user interface component (sometimes referred to as a control or widget in other programming environment languages) and the underlying data model.
- Data updates to the underlying data model and coordination of data changes that affect components are managed by the present invention, thereby simplifying application development.
- the bind operation 616 in the MyTasks application provides the application logic for binding the Input3 component 706 to a set of data represented in the data model.
- the deletion of the “update presentation” task from the underlying data XML document is automatically propagated to listening components, including applications and components that are listening to the same document over the network.
- data bindings facilitate exchange and synchronization of data between user interface components both locally and among remote clients over the network.
- the change operation 624 in the MyTasks application provides the application logic that updates the underlying data document with text entered into the Input4 component 708 .
- the Input3 component 706 is listening for changes to the underlying data document.
- the visual display of the Input3 component 706 is updated when text is entered into the Input4 component 708 and the trigger 602 is activated.
- the combination of data binding and the change operation 624 enables the synchronized exchange of data between user interface components.
- FIGS. 8A-B depict components 800 and 850 that are configured to display different visual representations of a user's file system folders.
- FIG. 8A depicts a component 800 that is configured to display the user's folders in a tree structure. If the user generates input requesting that the folders be displayed as a list, the data binding of the component 800 to the underlying data may be transferred to the component 850 , which will also transfer the state of the component 800 .
- This example illustrates that the present invention eliminates dependencies between the representation and processing of data from the configuration of the data model. Moreover, the transfer and sharing of data bindings not only provides an automated communication path between application layers in accordance with the MVC design paradigm, but also provides an enhanced platform for developing applications.
- the present invention provides a set of user interface components (i.e., buttons, input boxes, drop-down boxes, display panels, and the like).
- user interface components may inherit properties from a parent component utilizing the UI XML language and therefore be combined to express more complex user interface elements.
- an application may include a set of related components organized in a hierarchical structure in which each component is aware of a related component.
- a single user interface component may be defined that represents the entire view of an application.
- a component API Application Programming Interface
- the present invention supports the development of process-oriented applications using the process XML language.
- each process step in the MyTasks.xml document 600 represents part of the process execution flow. Operations within a process step may define a state change in the application being executed. Communications between processes are supported through the controlled access to data that describes the runtime state of an application and through the utilization of messaging ports. Developers may reference views, components, and other runtime variables with expressions that utilize globally-named objects. In this regard, an expression language or common way of referencing and manipulating objects is provided. Generally described, the expression and process XML languages collectively abstract the complexities of executing multi-instance applications. Instead, developers may create an application as though the application would only exist in a single instance of execution.
- expressions are structured to be compatible with XML syntax and may be delimited or tagged for use within other programming languages.
- the XML virtual machine performs the work of identifying, merging, and otherwise manipulating the requested data in accordance with the received expression.
- globally-named objects may be utilized by developers in application code even though multiple runtime instances of the application are being executed.
- the present invention provides a client-side component that is implemented in a plurality of “classes” from which “objects” may be instantiated.
- the client-side component may be implemented using a programming language such as JavaScript that utilizes object-oriented programming features.
- the invention may be implemented using non-object oriented languages such as the C programming language or any other language in which structures may be represented as objects.
- objects created from a class typically include methods that encapsulate or hide the algorithms that implement the object's functionality. Instead of exposing these implementation details, objects provide interfaces by which other modules may access their functionality as an abstraction. Accordingly, functionality that implements the XML virtual machine in accordance with one embodiment of the present invention occurs in the context of objects that utilize object-orientation and inheritance.
- the client-side component serves as an XML virtual machine that executes applications written in languages that adhere to the XML syntax.
- the XML virtual machine is configured to execute application code described semantically in a process modeling language (e.g., the process XML language), user interface modeling language (e.g., the UI XML language) and an application package modeling language (e.g., the application package XML language).
- a process modeling language e.g., the process XML language
- user interface modeling language e.g., the UI XML language
- an application package modeling language e.g., the application package XML language
- the XML virtual machine may be extended to understand additional XML languages or XML-based applications to provide functionality not described herein.
- a JavaScript API or libraries could be used to build applications implement the same functionality. Accordingly, the utilization of XML-based languages is merely exemplary and the present invention could be implemented using traditional programming languages.
- an application being interpreted by the XML virtual machine may be understood as being in a particular state of execution.
- the process XML language allows developers to define the conditions for transitioning between states.
- the XML virtual machine implements functionality for managing the state transitions by (1) defining a set of runtime variables/objects that describe the state of an executing application; (2) implementing logic that drives when a transition in the application state will occur, and (3) providing low-level constructs that implement the appropriate change in the application state.
- the client-side component includes a plurality of “managers” or objects that will typically be instantiated at start-up of the client-side component of the network operating system and remain active throughout a user session.
- objects provided by the client-side component in accordance with an illustrative embodiment utilize object orientation and inheritance.
- a system context object 902 may be instantiated that serves as a placeholder where managers and other objects are embedded at runtime. Accordingly, the system context object 902 may be used to instantiate the managers depicted in FIG. 9 including the application manager 904 , process manager 906 , view manager 908 , transaction manager 910 , document manager 912 , and event manager 914 .
- Each manager typically performs a specific task that is exposed through the interface accessible from the system context object 902 . Accordingly, other objects implemented by the present invention may call and utilize a manager's functionality to perform the desired task. For example, the process manager 906 may be called to instantiate a process object in preparation of executing an application's process code. In another aspect, managers allow the controlled instantiation and communication between objects that provides the foundation for intra-application and intra-process security. While the description herein may be provided with reference to particular managers and the associated objects that a manager holds, those skilled in the art and others will recognize that the encapsulation of functionality into a particular type of manager is exemplary.
- the client-side component includes an application manager 904 that provides logic for managing the lifecycle of an application.
- functions are exposed by the application manager 904 for creating, opening, and terminating applications.
- An application may be represented internally as an application object that “registers” with the application manager 904 .
- the application manager 904 may be called to create a corresponding application object. Accordingly, the application manager 904 creates and holds references to all active applications in the system.
- attributes of one or more applications may be described semantically by developers in an application package using the application package XML language.
- the attributes described in the application package include references to resources and system settings that are utilized by a particular application to execute.
- Resources identified in the application package will typically include the XML documents that provide the semantic description of an application's view and process logic.
- the application manager 904 is configured to extract information from the appropriate application package and obtain the identified resources when an application is scheduled to execute.
- any XML data resource including UI and process XML documents, may be directly embedded into an application package.
- functionality that allows applications to continue executing when the client goes “off-line” is implemented by the application manager 904 .
- the appropriate application package may be referenced by the application manager 904 to identify the resources utilized by a corresponding application. Then, any resources that have not yet been cached locally are identified and obtained from the appropriate service provider.
- the process manager 906 depicted in FIG. 9 is responsible for creating and holding internal process objects that are used to execute process steps in an application.
- application logic written in the process XML language may define a sequence of process steps that each include one or more operations.
- a process object created and held by the process manager 906 is responsible for looping through and causing one or more low-level constructs or operation handlers to be called.
- the conceptual foundation of the network operating system is based on process-oriented operations that model low-level constructs. Higher-level constructs that, for example, model workflows, product lifecycle management, user collaboration, and the like, are constructed from these low-level constructs.
- the set of operation handlers provided by the present invention that models low-level constructs includes, but is not limited to, an open operation handler, bind operation handler, change operation handler, decision operation handler, and the like.
- an operation API is provided that allows developers to define additional operation handlers.
- the XML virtual machine may be extended to support and execute additional low-level constructs.
- the operations that may be used in an application are limited to those operations either created in accordance with the operation APIs or provided by the present invention. As a result, the ability of users to create malware or otherwise implement malicious functionality is severely restricted since only a limited and well-defined set of operations are available to execute application logic.
- an instance object is provided by the present invention that tracks the “runtime state” of an executing application or instance.
- An instance object tracks and otherwise manages the runtime state of an executing application and supplies context to other objects used to implement the XML virtual machine. Accordingly, instance objects couple operational meaning to the execution of processes and their associated operations.
- operation handlers are provided with data that accounts for these changes.
- the present invention supports dynamic execution of application logic using process objects that are stateless. In other words, even though multiple instances of an application may exist, only a single version of the application code is necessary, thereby saving memory.
- the client-side component includes a view manager 908 that is responsible for tracking the “views” or user interfaces associated with an executing application. Methods are provided by the view manager 908 for creating an internal view object which is used to render and update an application's user interface.
- the user interface of an application may be described semantically using the UI XML language. Accordingly, the relationships between components and other graphical attributes of the application's complete user interface may be represented in a UI XML document. View objects instantiated and held by the view manager 908 are utilized in rendering user interfaces that are described semantically in a UI XML document.
- the rendering of the user interface may be performed through a series of XML transformations.
- a user interface may be rendered without performing XML transformations and the description provided above should be construed as exemplary.
- the view manager 908 is configured to create view objects and holds reference to all active views in the system.
- the client-side component includes a document manager 912 that is responsible for instantiating and holding reference to document objects.
- XML documents are the data model that serves as a common data source in the network operating system environment. Even application logic, system settings, application states, and the like are represented in XML documents.
- the document manager 912 is responsible for causing documents to be loaded or cached in memory on a client computer. Accordingly, the document manager 912 may interact with other managers, such as the communication manager (described below), to obtain documents. Documents may be obtained from a remote network location using a communication channel or a channel can be established to access documents maintained on a local hard drive or other non-volatile memory on a client computer.
- the document manager 912 serves as a client-side cache tracking each document that is loaded into memory on a client computer.
- an internal document object that provides a structured object-oriented representation of the document may be instantiated.
- the document manager 912 holds references to all document objects in the system and exposes methods for creating, retrieving, saving, and renaming XML documents, among others.
- the event manager 914 visually depicted in FIG. 9 serves as a trigger event bus allowing aspects of the XML virtual machine to execute application logic in response to the activation of a trigger.
- a process object may utilize a notifier object to register a trigger as a listener with the event manager 914 .
- Other objects within the system such as component objects often register themselves directly as listeners to the event manager 914 .
- the notifier object receives and stores data that identifies the process step in an application that will be executed in response to the trigger being activated.
- data provided by a notifier object associates the trigger with an originating object (i.e., often a view or component object) where the trigger activation will originate.
- the event manager 914 allows objects (i.e., view or component objects) to push or otherwise notify registered listeners when a trigger is activated.
- the component object will notify and pass data to the event manager 914 .
- the event manager 914 will perform a look-up to identify listeners for the activated event. Then, the appropriate notifier or other listening objects may be alerted and provided with data that allows application execution to proceed to the appropriate process step.
- separate application instances may each use the same set of triggers and notifier objects. Providing an event manager 914 and associated systems that are configured to re-use the same resources in this way both increases performance and minimizes the memory used.
- a “trigger” refers to the occurrence of a defined triggering event that will cause application code to be executed. Accordingly, in the exemplary process XML document 600 described above with reference to FIG. 6A , the activation of a trigger 602 causes a particular process step defined in the application code to be executed.
- triggers implemented by the present invention are not normally activated upon the occurrence of a data update. In other words, other than specifying operations such as a data binding, developers are not required to provide logic for managing input and output from an application user interface to the data model. Instead, data updates are managed by the present invention by a separate data update notification event bus and do not correspond to the activation of a trigger. As described in further detail below, aspects of the present invention provides a separate event bus implemented in the document object that automatically handles propagation of data update events to components and other objects.
- the transaction manager 910 also depicted in FIG. 9 provides an interface for creating and propagating transactions used to update the contents of an XML document. Accordingly, when a change to the data model will be performed, this will result in a transaction.
- a transaction represents a relative change and may be represented as an XML data fragment that contains data used to implement or reverse a change to the data model.
- the change operation 624 that adds a task to an underlying data XML document may result in the creation of a transaction.
- the data update reflected in a transaction may be persisted to the data model as well as to any remote listeners.
- the transaction manager 910 includes identification and time stamping data when a transaction is created that may be used to “rollback” the data update represented in the transaction as well as identify the order in which transactions are generated.
- an application initiation routine 1000 that performs processing to open an application package.
- the application initiation routine 1000 may be performed in response to a user generating a command to launch an application.
- aspects of the present invention may provide a desktop environment in which users launch applications through the selection of a menu item, icon, and the like.
- a data type recognizer within the system context object 902 may be passed a URL that identifies the location of a document associated with an application package, XML document, or binary file.
- the data type recognizer is utilized in numerous ways to identify and associate actions with particular types of documents.
- the application initiation routine 1000 may be performed when the data type recognizer determines that a document that corresponds to an application package (e.g., application package XML document) is being opened.
- the application manager 904 is utilized to instantiate an application object at block 1002 .
- Multiple application objects that each represent a different application may be instantiated and held by the application manager 904 .
- a first application object may be instantiated that, for example, represents a word processing program.
- a second application object that represents a different program (e.g., an e-mail program) may be instantiated.
- process logic associated with one application is unable to access the internal objects (e.g., view objects, instance object, process object, etc.) that are associated with a different application. Accordingly, when executing the process logic of the word processing program, a view object associated with the e-mail application package is inaccessible.
- the use of the application manager 904 to instantiate and hold application objects is part of a larger framework provided by the present invention that insures both intra-application and intra-process security.
- an application package XML document may identify process and UI XML documents associated with an application, as well as other application resources such as images, data documents, XSLT documents, among others.
- Resources utilized by an application, including the application package XML document itself, may be cached in memory on the client or obtained from a service provider utilizing a communication channel (described below).
- the application package XML language allows developers to configure application packages in more advanced ways.
- conditional logic in an application package XML document may be used to implement a more fault-tolerant network service in which resources can be obtained from a failover network location.
- the application package can identify alternative network locations where the resources may be obtained.
- this is just one example of the way the present invention allows developers to configure an application package using the package XML language.
- the application initiation routine 1000 determines whether additional runtime instance(s) of the application is permitted.
- the application package XML language allows developers to establish configurations to limit the number of application instances that may be created. Accordingly, the determination made at block 1006 may be dependent on configurations defined in an application package XML document. If the determination is made, at block 1006 , that an additional instance is not permitted, then the application initiation routine 1000 proceeds to block 1008 where the command to launch an application that does not allow an additional instance is handled. In this regard, handling the command at block 1008 may include refreshing an existing runtime instance of the application. In addition or alternatively, handling the command may include informing the user through a dialogue that an additional instance of the application is not permitted. Then, upon handling the command, the application initiation routine 1000 proceeds to block 1014 , where it terminates.
- an instance object is instantiated that tracks and manages the runtime state of the application being launched.
- process and view objects are created, aspects of the present invention associate these objects with their corresponding instance.
- the instance object instantiated at block 1010 maintains structures for tracking process and view objects, aliases, and other runtime variables. Accordingly, process and view objects associated with this application instance will be known to the instance object.
- a localized relationship hierarchy may be established that delimits the boundary of an application instance. As described in further detail below, this framework associates process and view objects with a corresponding instance and delimits access to these objects from outside the localized relationship hierarchy.
- the context provided by the instance object instantiated at block 1010 allows functionality to be implemented relative to an application's runtime state.
- the instance object instantiates and holds a local expression engine for evaluating expressions encountered in application code being interpreted.
- a process object may utilize a corresponding instance object and a local expression engine that the instance holds to evaluate expressions.
- the instance object instantiated at block 1010 may be supplied when executing operations in order to couple operational meaning to the execution of process logic.
- the application object instantiated at block 1002 is utilized to open and initiate execution of an application's process and view logic. Routines for opening and initiating execution of logic in process and UI XML documents are described below and will not be provided here.
- a new instance object will be supplied to track the runtime state of the application. For example, an application object that represents a word processing program will supply a different instance object each time an instance of the word processing application is launched.
- aspects of the present invention are able to control access to objects that are associated with an executing application.
- the application initiation routine 1000 proceeds to block 1014 , where it terminates.
- the application manager 904 instantiates an application object that provides an encapsulated representation of the application. As illustrated in FIG. 10B , the application manager 904 may instantiate the Application Object A 1030 , Application Object B 1032 , and Application Object Nth 1034 . In one embodiment, an application object is utilized to instantiate and hold one or more instance objects. In the example depicted in FIG.
- the Application Object A 1030 may instantiate and hold the Instance Object A 1 1036 , Instance Object A 2 1038 , and Instance Object A-Nth 1040 .
- the Application Object B 1032 may instantiate and hold the Instance Object B 1 1042 and the Instance Object B-Nth 1044 .
- a unidirectional solid arrow between objects depicted in FIG. 10B indicates that the source object where the arrow originates holds the destination object identified by the arrow pointer.
- the solid arrow from the application manager 904 to the application objects 1030 - 1034 indicates that these objects are held by application manager 904 . From the illustration in FIG. 10B , the relationship between the application manager 904 , application objects 1030 - 1034 , and their corresponding instance objects 1036 - 1044 is apparent.
- FIG. 10B The relationship between objects depicted in FIG. 10B illustrate how the present invention is able to ensure intra-application security.
- Access to application objects is controlled by the application manager 904 which exposes methods for creating, opening, and terminating applications.
- the application manager 904 isolates the application object into a separate memory space. By preventing application objects from sharing a memory space, code from one application may not be injected into or otherwise affect the memory space allocated to a different application.
- an application object provides an encapsulated representation of an application in which internal data associated with the application may be hidden. All of the functionality of the application and access to internal data is controlled through the creation of exposed methods.
- the internal objects e.g., view objects, instance object, process object, etc.
- the internal objects associated with one application are rendered inaccessible to a different application. Accordingly, when executing code utilizing the Application Object A 1030 , internal objects associated with the Application Object B 1032 may not be accessed. Even though the internal data of an application may not be accessed, data may be shared utilizing the underlying data model. Accordingly, if a user has sufficient access rights, a document may be shared by multiple applications. In other words, the intra-application security framework provided by the present invention does not prevent the authorized sharing of data between applications using the underlying data model.
- FIG. 10C the utilization of instance objects to implement a localized relationship hierarchy will be described in additional detail.
- the illustration in FIG. 10C includes the application object 1050 and instance object 1052 .
- FIG. 10C depicts a process object 1054 , view object 1056 , component object 1058 , and a dialog object 1060 that are instantiated when an application's process and UI XML documents are opened.
- the application object 1050 supplies the instance object 1052 when initiating execution of an application.
- the dashed unidirectional arrows originating from the application object 1050 to the view object 1056 and process object 1054 indicate that these objects were created within the localized relationship hierarchy that is specific to the supplied instance object 1052 .
- the instance object 1052 maintains a MiniView manager 1062 and a MiniProcess manager 1064 .
- the instance object 1052 is provided with a reference to the resulting process object 1054 that is tracked using the MiniProcess manager 1064 .
- the view object 1056 that results when an application view is opened is supplied to the instance object 1052 and held by the MiniView manager 1062 . Accordingly, the updates to the MiniProcess manager 1064 and MiniView manager 1062 allow the instance object 1052 to track and identify objects that are associated with a particular application instance.
- globally-named objects may be referenced in accordance with an expression language provided by the present invention.
- global names assigned to objects in application code may reference runtime objects that belong to different instances.
- the following expression may be used in application code to reference the view object 1056 : “#MyTasks.”
- the following expression may be used to reference a component object (e.g., Button) that is created within the context of the aforementioned view object 1056 : “#MyTasks#button1.”
- aspects of the present invention implement functionality that allows globally-named objects encountered in application code to be evaluated relative to the appropriate instance.
- the evaluation of globally-named objects is performed without creating duplicate process or UI XML documents. Instead, an application's process and UI documents are shared and used to build the runtime objects for multiple application instances.
- the implementation of a localized relationship hierarchy provides a basis for identifying and/or supplying the appropriate instance when expressions are evaluated and accessing the appropriate view object within the instance.
- a bidirectional arrow is depicted between the instance object 1052 and the view object 1056 .
- the bidirectional arrow indicates that the instance object 1052 is aware that the view object 1056 is associated with this particular application instance.
- the view object 1056 may be supplied to the instance object 1052 and held by the MiniView manager 1062 .
- an identifier for the instance object 1052 is supplied when an application view is created so that the view object 1056 is aware of its associated instance.
- the appropriate instance may be identified when input is received that will cause a data update or application logic to be executed.
- the component object 1058 may be instantiated when the view object 1056 is used to open an application view. Since the component object 1058 is created within the context of an application view, it may communicate with the view object 1056 . As a result, the component object 1058 may identify the appropriate instance object 1052 when, for example, a user provides input that will cause application code to be executed.
- a unidirectional arrow is depicted between the instance object 1052 and the process object 1054 .
- the process steps in an application are executed using the process object 1052 .
- the instance object 1052 is aware of its associated process object 1054 .
- process objects provided by the present invention are stateless between execution of process steps.
- process objects are supplied with the context from a single instance object 1052 .
- the process object 1052 is not aware of an associated instance object 1052 between execution of process steps.
- the process object 1054 may utilize the services of an expression engine (described below) that is held by a supplied instance object 1052 .
- the localized relationship hierarchy depicted in FIG. 10C and the associated description illustrates how the present invention is able to ensure intra-process security while still supporting multi-instance applications.
- the process object 1054 may only be supplied context from one instance object 1052 .
- This framework in which relationships are established so that the process object 1054 is supplied context from a single instance object 1052 , allows a strict separation between objects associated with different instances. Accordingly, when executing application code, the process object 1054 is not able to access objects that are in the localized relationship hierarchy of a different instance.
- aspects of the present invention are able to create sub-instances within a localized relationship hierarchy established by a parent instance.
- the sub-instance and its resulting sub-view object and sub-process objects are created within a localized relationship hierarchy of the parent instance.
- the localized relationship hierarchy delineated by the sub-instance is visible to objects created within the relationship hierarchy of the parent instance.
- runtime objects that are created within the sub-instance are not aware of objects associated with the parent instance or other sub-instances. This ability to nest sub-instances within a parent instance offers great flexibility to application developers in building more modular code as well as the ability to utilize different scopes.
- the process initiation routine 1100 may be performed when a call to open a document that contains process logic is generated.
- calls to open a file may be issued to the data type recognizer that receives a URL from a calling object.
- the URL passed to the data type recognizer may correspond to any type of document including, but not limited to, an application package XML document, process XML document, or UI XML document.
- the data type recognizer may cause particular actions to be performed that facilitate application execution.
- the data type recognizer determines that the supplied document is a process XML document and causes actions that are specific to this file type to be performed.
- the process initiation routine 1100 depicted in FIG. 11 illustrates two exemplary circumstances in which a process XML document may be opened. However, the examples provided below should be construed as exemplary as process XML documents may be opened in other circumstances without departing from the scope of the claimed subject matter. As illustrated in FIG. 11 , the process initiation routine 1100 begins either at block 1102 or block 1104 . In an exemplary embodiment, the routine 1100 begins at block 1102 where the data type recognizer receives a call to open a process XML document that is associated with an application package. In this embodiment, an application object supplies a previously created instance object in the call received at block 1102 .
- the process initiation routine 1100 will instantiate a process object in anticipation of executing process steps defined in the process XML document.
- a reference to this process object may later be provided to the corresponding instance that is supplied in the call received at block 1102 .
- the process initiation routine 1100 begins at block 1104 where the data type recognizer receives a call to open a process XML document that represents a stand-alone application. Applications are not required to be associated with an application package. In this embodiment, the data type recognizer does not receive a supplied instance at block 1104 in the call to open the process XML document. Applications that are configured to be stand-alone in this way do not support multiple instances of execution and allow applications to share at least some memory space.
- processing is performed by the data type recognizer to identify the file-type of the document that will be opened.
- the analysis performed by the data type recognizer will determine that the document associated with the received call is a process XML document.
- the data type recognizer may associate actions with a particular file type.
- the data type recognizer Upon encountering a request to open a process XML document, the data type recognizer is configured to call the process manager 906 , at block 1108 , indicating that request to open a process XML document has been received.
- logic within the process manager 906 determines whether a process object for this process XML document is cached in memory.
- the process initiation routine 1100 is responsible for instantiating a new process object when an application is initially launched. Once instantiated, logic is implemented by the process initiation routine 1100 that enables the newly instantiated process object to execute a process step. Since the process object is stateless, it may be reused. As such, the same process object may be used to execute application code from the same instance of an application package or other processes embedded in the process XML document. Accordingly, the process object instantiated when an application is launched may be cached in memory by the process manager 906 .
- the process manager 906 previously instantiated a process object for this application that is still in memory, the result of the test performed at block 1110 is “yes,” and the process initiation routine 1100 proceeds to block 1120 , described in further detail below. Conversely, if a determination is made that a new process object will be instantiated, the process initiation routine 1100 proceeds to block 1112 . Before the new process object is instantiated, the process XML document being opened should be available locally. To this end, the process manager 904 generates a call that is routed through the document manager 912 to obtain the appropriate process XML document at block 1112 .
- the document manager 912 serves as a client-side cache, tracking each document that is loaded in memory on the client. If a determination is made that the process XML document being opened is referenced in the client-side cache maintained by the document manager 912 , then the process initiation routine 1100 proceeds to block 1118 , described in further detail below. Conversely, if the requested process XML document is not loaded in the client-side cache, the process initiation routine 1100 proceeds to block 1116 , where the document manager 912 causes the requested process XML document to be obtained from a service provider. More specifically, at block 1116 , the document manager 912 utilizes the communication manager (described below) to request that the appropriate process XML document be obtained from a network location identified by a supplied URL.
- a new process object is instantiated at block 1118 .
- logic within the process manager 904 is utilized to instantiate a new process object in anticipation of executing application code.
- the new process object is registered at block 1120 as a listener on its corresponding process XML document.
- an object may be notified and take certain action when a specified data update to the document is performed.
- notifier objects are instantiated for each trigger in the application. Specifically, parsing may be performed to identify the trigger elements defined in the process XML document being opened.
- the MyTasks application defines a trigger 602 ( FIG. 6A ) that would result in a notifier object being instantiated at block 1122 .
- Triggers may be defined as elements in a process XML document with each trigger including the view, component, event, and step attributes. The value assigned to the view and component attributes identifies the application view and/or component where the trigger will be activated. Similarly, the value assigned to the event attribute identifies the type of event that will activate the trigger.
- the value assigned to the step attribute identifies the process step in the application's process code where execution will be directed in response to the trigger.
- logic within the process manager 906 instantiates a notifier object and caches data in the notifier object that may be subsequently used to execute a particular process step.
- each trigger defined in an application is registered with the event manager 914 at block 1124 .
- the event manager 914 maintains an internal hash data structure that associates a set of trigger data with listening notifier objects. Accordingly, triggers may be registered by updating the hash data structure maintained by the event manager 914 . As described in further detail below, the event manager 914 notifies the appropriate listening objects and notifier objects when an event that matches a registered event for a component and event type occurs.
- the instance When opening a process XML document, the instance may be supplied. Specifically, the application initiation routine 1000 described above may instantiate and supply the instance when opening a process XML document. Also, instances may be supplied in other circumstances in order to support modular application development and for different processes to share context. In these embodiments, a new instance will not be instantiated, and the process initiation routine 1100 proceeds to block 1130 , described in further detail below. Conversely, if an instance object was not supplied, the process initiation routine 1100 proceeds to block 1128 , where an instance object is instantiated. Specifically, logic within the process manager 906 generates a call to instantiate the new instance object at block 1128 .
- a call to execute a process step defined in a process XML document is generated.
- a process object is configured to cause a process step to be executed based on two received parameters: (1) a supplied instance representing the runtime state of an application; and (2) the identifier of the process step that will be executed.
- the instance that is supplied to the process object may be created within the context of an application package or a stand-alone application.
- the process initiation routine 1100 is configured to provide a process object with parameters that allow the process object to be re-used for multiple instances in executing each process step defined in the process XML document. Then, the process initiation routine 1100 proceeds to block 1132 , where it terminates.
- execute method When a process step will be executed, flow of control is directed to an execute method encoded within a process object.
- the execute method loops through and causes each operation defined in a process step to be executed.
- the execute method is the interface to the process operations developed in accordance with the process operation API.
- the execute method could be called by the process initiation routine 1100 in order to execute process step “1” defined in the MyTasks application.
- the execute method would perform processing that causes the Open, Bind, and Action operations 612 - 616 within this process step 604 to be executed.
- an execute method 1200 will be described that is configured to cause operations in a process step to be executed.
- the execute method 1200 begins at block 1202 where a new operation within a process step is identified.
- operations within a process step are typically identified and executed sequentially.
- an expression provided in the value attribute of the operation is selected for evaluation at block 1203 .
- the MyTasks document 600 FIG. 6A ) defines an Initialize Application process step 604 .
- the first operation is an Open operation 612 having a value attribute “apps/mytasks_gui.xml.”
- the expression “apps/mytasks_gui.xml” would be selected for evaluation at block 1203 .
- FIG. 12 provides examples in which operations within a process step are executed sequentially.
- aspects of the present invention support asynchronous execution of operations so that each operation in a process step may not be executed sequentially. For example, if a first operation requested a resource that is only available from a remote network location, other operations (that are not dependent on the results of the first operation) may be executed while the resource is obtained asynchronously.
- an XBind is a data type that comprises a URL, base path (e.g., an XPath expression that references an XML fragment within the document identified by the specified URL), and a selection (e.g., a plurality of XPath expressions).
- base path e.g., an XPath expression that references an XML fragment within the document identified by the specified URL
- selection e.g., a plurality of XPath expressions.
- the “apps/mytasks_gui.xml” expression would be evaluated into the following XBind, at block 1204 :
- the URL of this XBind references the UI XML document that provides the semantic description of the application's user interface. While the examples provided herein utilize a URL as the format for identifying resources this should be construed as exemplary. Any system that is capable of uniquely identifying a resource may be implemented in conjunction with the present invention. As described in further detail below, the network operating system provides protocols and abstractions for accessing an XML file system, databases, and XML web services using URLs. However, it is contemplated that other protocols could be used to identify resource locations other than URLs.
- the base path of the above XBind is “I” which references the root element of the UI XML document identified in the URL.
- the base path could reference a fragment within a UI XML document.
- the semantic description of the view logic is not associated with the root node of the UI XML document.
- the XBind for this variation would include a base path referencing the node that corresponds to the view logic.
- the selection for this exemplary XBind is “null” as it does not contain data.
- FIG. 12B an interchange that occurs when an expression is evaluated will be described.
- the illustration in FIG. 12B includes a set of objects that include the instance object 1250 , the process object 1252 , and the view object 1254 . Similar to the description provided above with reference to FIG. 10C , the dashed arrows depicted in FIG. 12B indicate that the process and view objects 1252 - 1254 were previously associated with the localized relationship hierarchy that is specific to the instance object 1250 .
- the process object 1252 may utilize the instance object 1250 to evaluate an encountered expression. Since the instance object 1250 is supplied when execution of a process step is initiated, the process object 1252 may utilize the instance object 1250 within the process step in order to have the expression evaluated by the expression engine 1260 .
- the present invention implements an expression engine 1260 configured to evaluate expressions within the context provided by the instance.
- functionality encapsulated in the expression engine 1260 may be used within the context of the instance object 1250 to evaluate the expression 1262 into the XBind 1264 , XML formatted data, or plain text.
- the XBind 1264 identified by the expression engine 1260 may be passed from the instance object 1250 to the process object 1252 .
- evaluation of expressions is readily performed relative to the context supplied by the instance or any sub-instance.
- utilizing a local expression engine 1260 in this way allows instance and scope handling to be performed within a multiple chained scope depth. Accordingly, expressions may be evaluated differently, depending on the application instance that is executing, and developers are not required to account for the complexity of managing multiple instances or scopes. Additional descriptions of the functionalities implemented within the expression engine 1260 and the types of expressions that may be evaluated by the present invention will be described in further detail below.
- the expression engine 1260 may be used to evaluate multiple expressions defined within an operation. Each of these expressions within the operation is evaluated before an operation handler is called, as described in further detail below.
- the execute method 1200 initiates execution of the appropriate operation handler at block 1206 .
- a plurality of operation handlers are provided by the present invention. Each operation handler implements functionality specific to the type of operation that may be encountered. Accordingly, if the current operation is an open operation, then the execute method 1200 calls an open operation handler at block 1206 .
- other operation handlers are implemented (Bind, Decision, Action, Change, etc.) that may be called within the execute method 1200 .
- the execute method 1200 is configured to pass arguments that are appropriate for the particular operation handler being called using a well-defined process operation APIs, which will be discussed in the examples below.
- each operation handler is supplied with at least instance and process objects and an evaluated XBind when called.
- a process step may include a statement that directs the flow of application execution.
- a “call” statement may be defined as a statement in a process step that directs the flow of execution to a different process step once all of the operations in the current process step have been executed. More generally, a “call” operation is provided that allows developers to direct the flow of execution between operations of one process step to a different process step.
- flow proceeds to the new process step and, upon completion, returns to a location within the originating process step.
- asynchronous calls, time delay calls and time repeated interval calls may be generated using the “call” operation. Then, once all of the operations have been executed, the execute method 1200 proceeds to block 1210 , where it terminates.
- the execute method 1200 initiates execution of particular operation handlers when interpreting application logic.
- the functionality implemented by particular operation handlers will be described. Since an operation handler implements a state change, all data that an operation handler utilizes is supplied. Moreover, aspects of the present invention are configured so that operation handlers do not return data. As such, operation handlers may be implemented as stand-alone functions that are supplied with everything used to execute without returning data. Accordingly, process operations in an application may be executed locally. However, since operation handlers are stand-alone functions, they may be provided as a Web service, from a server-side data center.
- an exemplary open handling routine 1300 that utilizes an open operation handler will be described.
- the application defines an Open operation 612 having a value attribute that may be evaluated to an XBind within the execute method 1200 ( FIG. 12A ).
- an open operation handler may be called to execute the open operation 612 .
- arguments may be passed in the call to the open operation handler that include a previously evaluated XBind and the appropriate instance and process objects.
- the data type recognizer is called within the open operation handler to open a document.
- a previously evaluated XBind may point to a document or fragment (node) within a document that is being opened.
- the open operation handler passes this previously evaluated XBind that identifies the document being opened in the call to the data type recognizer.
- the data type recognizer Upon receiving the call, the data type recognizer performs processing at block 1304 to identify the file type of the document referenced in the received XBind.
- the XBind passed to the data type recognizer references the document entitled “MyTasks_gui.xml.”
- the data type recognizer would identify the file type as being an UI XML document.
- logic is provided within the data type recognizer that associates actions with particular file types. An exemplary set of actions initiated when the data type recognizer is utilized to open a UI XML document are described below.
- the data type recognizer passes a command to the view manager 908 indicating that a request to open an UI XML document has been received.
- the view manager 908 is called to create a view object that will be used to render a new user interface or application view.
- the user interface of an application may be described semantically in an UI XML document (e.g., “MyTasks_gui.xml”).
- multiple view objects may be associated with each application instance. Accordingly, in the call to the view manager 908 , the identifier of the appropriate instance and the UI XML document that describes the new view may be supplied by the data type recognizer.
- execution of logic that provides the semantic description of a new application view is initiated.
- the view manager 908 is responsible for instantiating a view object and performing tasks that allow an application view described in a UI XML document to be rendered.
- component and dialog objects are instantiated utilizing a view object.
- these objects provided by the present invention implement functionality that allow graphical elements described semantically in a UI XML document to be rendered on a computer display. Then, the open handling routine 1300 proceeds to block 1310 , where it terminates.
- FIG. 14A depicts the process object 1400 , open operation handler 1402 , data type recognizer 1404 , instance object 1406 , view manager 908 , and the view object 1408 that interact when an UI XML document is opened.
- the block diagram depicted in FIG. 14A may correspond to the objects that are utilized by the open operation handling routine 1300 described above with reference to FIG. 13 .
- the opening of an application view may be initiated by the process object 1400 , which calls the open operation handler 1402 to open a particular document identified by an evaluated XBind.
- the open operation handler 1402 Upon receiving the call, the open operation handler 1402 utilizes the data-type recognizer 1404 to identify a file type and cause the appropriate actions to be performed.
- the data type recognizer 1404 Upon receiving the call, the open operation handler 1402 utilizes the data-type recognizer 1404 to identify a file type and cause the appropriate actions to be performed.
- actions are defined that facilitate opening and initiating execution of an application's view logic.
- the data type recognizer 1404 is utilized to associate the resulting view object 1408 with the appropriate instance object 1406 .
- the view manager 908 is called by the data type recognizer 1404 when a call to open a UI XML document is received.
- the view manager 908 instantiates and supplies the view object 1408 an identifier of the instance object 1406 and an XBind referencing the appropriate UI XML document. By passing data in this way, the view object 1408 becomes aware of its associated instance.
- execution of logic that provides the semantic description of the new application view is initiated utilizing functionality that is similar to the process initiation routine 1100 ( FIG. 11 ) described above.
- the view manager 908 may cause the appropriate UI XML to be loaded into the client-side cache. Then, the view object 1408 may be instantiated and used to render an application's user interface components and dialogs. However, unlike processes, multiple view objects may be instantiated and associated with the same instance.
- aspects of the present invention support lazy loading and/or rendering of an applications' UI logic.
- XLinks implemented in accordance with a standard defined by the World Wide Web Consortium may be utilized to perform lazy loading and/or rendering of one or more UI XML documents.
- an XLink may be included in an XML document that describes a link between different XML resources.
- XLinks are more readily interpreted by software systems and computers.
- XLinks may contain logic that defines the conditions that will activate the XLink as well as the actions to be taken upon the activation.
- XLinks are well-suited for performing on-demand and/or lazy rendering of an applications UI logic. Instead of loading all of an applications' UI logic when an the application is launched, XLinks may be defined for linking to the appropriate XML resource on demand. For example, in the exemplary MyTasks application described above, the Button2 component 704 is “hidden” after all of the applications' user interface logic is loaded and rendered. Equivalent functionality and improved performance may be achieved by using an XLink to load and/or render the UI logic of the Button2 component 704 when needed.
- the user interface logic associated with the Button2 component 704 in the MyTasks_gui.xml document 650 may include an XLink that references a local or remote resource (e.g., another UI XML document) that defines the relevant user interface logic. When dictated by application logic, this XLink may be used to load and/or render the UI logic corresponding to the Button2 component 704 .
- a local or remote resource e.g., another UI XML document
- the resulting view object 1408 is returned to the data type recognizer 1404 .
- the data type recognizer 1404 associates the view object 1408 with the appropriate instance. Specifically, when a new application view is created, the data type recognizer 1404 passes the resulting view object 1408 to the instance object 1406 .
- the MiniView manager 1412 is updated, thereby associating the view object 1408 with a corresponding instance.
- a more complex name is assigned to the view object 1408 within the View manager 908 than is allocated to the same object by the MiniView manager 1412 .
- the name assigned to the view object 1408 within the View manager 908 includes the identifier of the corresponding instance object 1406 .
- aspects of the present invention implement localized relationship hierarchies that delimit the bounds of an application instance.
- FIG. 14B the utilization of the data type recognizer 1404 in opening a process XML document will be described in additional detail. Similar to FIG. 14A , the illustration in FIG. 14B depicts the process object 1400 , data type recognizer 1404 , instance object 1406 , as well as the process manager 906 . Accordingly, the block diagram depicted in FIG. 14B may correspond to the objects utilized by the process initialization routine 1100 ( FIG. 11 ).
- the data type recognizer 1404 is utilized either in the context of an application package or stand-alone application to identify the file type of the document. In this example, the data type recognizer 1404 defines actions that facilitate opening and initiating execution of logic described in the process XML document.
- flow of execution proceeds from the data type recognizer 1404 to the process manager 906 which instantiates the process object 1400 .
- a reference to the resulting process object 1400 may be returned to the data type recognizer 1404 .
- the data type recognizer 1404 supplies the instance object 1406 with a reference to the resulting process object 1400 .
- the MiniProcess manager 1414 is updated, thereby associating the process object 1400 with a corresponding instance.
- FIGS. 15A-B an action operation that provides an example regarding the use of the MiniView manager in facilitating process execution will be described.
- flow of execution proceeds to the Action operation 614 ( FIG. 6A ).
- an action handling routine 1500 will be described with reference to FIGS. 15A-B which illustrates both the logic as well as the interactions between objects involved in implementing the routine 1500 .
- the expression represented in the value attribute of the Action operation 614 is evaluated into an XBind, at block 1502 .
- the Action operation 614 contains a value attribute of “#MyTasks” which would be evaluated into an XBind at block 1502 .
- functionality encapsulated in the expression engine 1550 may be used by the instance object 1552 to evaluate the “#MyTasks” expression into an XBind.
- the expression engine 1550 is configured to perform a lookup in the MiniView manager 1554 for the view object that is named “MyTasks.”
- MyTasks When a new application view is created, the resulting view object is passed to a corresponding instance which updates the MiniView manager 1554 accordingly.
- the MyTasks view object is assigned a straightforward name within the MiniView manager 1554 held by the instance than the more complex identifier used for the views in the global View Manager 908 .
- the more complex name is not needed within the instance, since the complex name is used to differentiate the views belonging to different instances and applications. This information is something the instance and its MiniView Manager 1554 already knows, since the MiniView Manager 1554 holds its own views.
- the expression engine 1550 is able to differentiate between views that are associated with different instances and applications. Therefore, in the exemplary MyTasks application, the MiniView manager 1554 would include a view object named “MyTasks.” The view object would also include a reference for the instance in which this view object is associated. In evaluating the “#MyTasks” expression, the expression engine 1550 would identify the MyTasks view object 1558 as the source or “emitter” of the operation. Specifically, the MyTasks view object 1558 associated with the instance object 1552 is identified as the emitter and not a “MyTasks” view object associated with a different instance. Since the expression engine 1550 evaluates expressions relative to the instance, the correct MyTasks view object 1558 that was the source of the event is identified utilizing the MiniView manager 1554 .
- the XBind returned to the process object 1556 would include the URL referencing the MyTasks_gui.xml document 650 and the MyTasks view object 1558 .
- An indicator would be included with the XBind that the MyTasks view object 1558 is the emitter or source of the operation being executed.
- the expression engine 1550 is configured to perform a lookup in the view manager 908 to obtain the relevant view object.
- the process object 1556 initiates execution of the action operation handler 1560 .
- the XBind previously evaluated using the expression engine 1550 and the emitting MyTasks view object 1558 are passed by the process object 1556 to the Action operation handler 1560 .
- the action operation handler 1560 causes the method, as specified in the applications process logic, to be performed.
- the Action operation 614 in the MyTasks application defines the following “ ⁇ component>” XML element that identifies the method and target of the action to be performed:
- view objects are encoded with generic methods for performing state manipulations on their associated user interface components including, but not limited to, enable, disable, hide, and show methods, etc. Since the MyTasks view object 1558 is passed to the action operation handler 1560 , these generic methods may be called directly on the object 1558 . In this example, the action operation handler calls the “hide” method on the MyTasks view object 1558 and identifies the Button2 component 1562 as the target component that will be hidden. Then, the action handling routine 1500 proceeds to block 1508 , where it terminates.
- FIG. 16 the implementation of a bind operation handler will be described in additional detail.
- the Open and Action operations 612 - 614 in the MyTasks application has been executed, flow of execution proceeds to the Bind operation 616 ( FIG. 6A ).
- the expression represented in the value attribute of the Bind operation 616 is evaluated into an XBind and returned to the appropriate process object, at block 1602 .
- the process object utilizes an expression engine that is local to the instance to evaluate the provided expression.
- the “data/tasks.xml” expression would be evaluated into the following XBind, at block 1602 :
- the URL of this XBind references the data document that stores task descriptions. Moreover, the base path references the root node of the data document corresponding to the URL and the selection aspect of this exemplary XBind is null.
- the process object being utilized to execute the current process step initiates execution of a bind operation handler.
- the bind operation handler receives a previously evaluated XBind and the appropriate process and instance objects.
- developers are able to create operation handlers in accordance with the process operation APIs that define function call parameters and the XML semantic structure that may exist within the body of the operation.
- the Bind operation 616 ( FIG. 6A ) defines the following “ ⁇ component>” XML element 618 :
- the bind operation handler (called at block 1604 ) is responsible for interpreting this logic to bind a particular component to a fragment within an XML document. More generally, each operation handler is responsible for interpreting the logic defined in the child elements of the operation element.
- the process operation APIs allow developers to define the XML syntax in the body of the operation so that the logic executed within an operation handler may be configured as needed.
- the view object corresponding to the component that will be bound to the underlying XML document is identified and returned to the bind operation handler.
- the component element 618 interpreted by the bind operation handler identifies the “Input3” component as being created within the context of the “MyTasks” view object. Since the appropriate instance object is supplied to the bind operation handler, the correct view object may readily be identified. Specifically, a lookup in the MiniView manager 1554 of the instance is performed and the “MyTasks” view object is returned directly to the bind operation handler.
- a translated XBind is created within the bind operation handler at block 1606 .
- the XBind that is passed into the bind operation handler identifies a document (“data/tasks.xml”) that stores content utilized by the MyTasks application.
- data/tasks.xml a document that stores content utilized by the MyTasks application.
- the binding performed by the bind operation 616 in this example is configured to narrow the binding of the Input3 component to a fragment of the data in the “data/tasks.xml” document identified by an XPath expression.
- the select attribute in the component element 618 includes an XPath expression that qualifies the expression in the value attribute of the bind operation 616 .
- the XPath expression identifies the appropriate fragment within the XML document that is used to qualify the incoming XBind to the bind operation handler and create the following translated XBind:
- the aforementioned translated XBind could be written in shorthand notation as “data/tasks.xml#/tasks/task/@description.”
- the URL of the translated XBind references the XML document in the data model that stores the relevant task descriptions.
- the base path references the task element and its corresponding description attribute.
- an XBind may also include a “Selection” that provides additional features in referencing fragments in the data model.
- the set data function provided by the appropriate user interface component is called.
- the Input3 component is the subject of the Bind operation 616 and will be bound to a list of task descriptions.
- the component APIs may be used to define certain methods for setting data on a particular component.
- the Input3 component may include a set data method that is called at block 1608 .
- the appropriate component may be identified based on the view object and the reference to the component name received at block 1604 when the bind operation handler was called.
- the set data method When called, the set data method will typically perform administrative functions and error handling to ensure that a component is not already bound to an XML document in the data model. Then, at block 1612 , the Input3 component that is the subject of the bind operation 616 is added as an update listener to the “data/tasks.xml” document.
- the present invention provides a structured object-oriented representation of the XML document in the form of a document object.
- document objects serve as a wrapper to DOM (“Document Object Model”) objects utilized by a Web browser and an XML parser.
- enhanced features are encoded within the document object provided by the invention that includes the ability to add any objects that exist within the network operating system environment as listeners for updates made to the data model.
- the objects that may be data update listeners includes, but is not limited to, processes, views, components, communication channels, etc.
- a call is made to add the Input3 component as an update listener to the object that corresponds to the “data/tasks.xml” document.
- each document object maintains a list of listeners that will be notified in response to a data update.
- the Input3 component will become one of potentially many data update listeners on the same document object.
- the present invention supports functionality that allows rules to be associated with a data binding component.
- a rule handler may be included in the data model that defines how components and other objects will interpret their data binding.
- rules allow generic components to interpret, learn, and take appropriate action depending on the content in the data model. Accordingly, any XML semantics or languages having different elements, attributes, and hierarchies may understand and/or be bound to the same type of generic component. In other words, components that use rules do not need to be created specifically for a certain data model.
- rules enable a generic set of components to be used with any type of underlying data and therefore facilitates true data abstraction in the MVC design paradigm.
- the component does not need to understand the structure of the underlying data model and may use rules to interpret content to achieve the desired functionality.
- functionality is implemented for setting and/or updating a rule handler so that rules may be applied.
- a flag may be included to indicate whether the component is a rule user. Accordingly, if the received flag indicates that the component is not a rule user, the result of the test performed at block 1614 is “no” and the bind handling routine 1600 proceeds to block 1618 , described in further detail below.
- a set rule routine 1600 is performed that applies and merges rules of a data binding component to a rule handler maintained in the data model.
- the logic implemented by the set rule routine is described in further detail below with reference to FIG. 21 .
- a call is generated to update the user interface of the component that is the subject of the bind operation.
- Methods defined in accordance with the component APIs may be used in performing an update of a user interface.
- the component APIs have developers provide logic that is used to implement an “Updated” method for a component.
- logic that may be implemented within the “Updated” method is described in further detail below with reference to FIG. 22 .
- the “Updated” method associated with the Input3 component will result in task descriptions maintained in the data model being displayed.
- the bind handling routine 1600 proceeds to block 1620 , where it terminates. Once the Bind operation 616 completes execution, the new data binding component will be notified of updates effecting the data model (“data/tasks.xml”).
- the Bind operation 616 is the last operation in the Initialize Application process step 604 that is executed. Upon execution of the Bind operation 616 , processing of the MyTasks application remains idle until the occurrence of a trigger.
- a trigger activation routine 1700 is described below with reference to FIG. 17 .
- a description of functionality implemented by the expression engine provided by the present invention will be described in additional detail.
- XBinds provide a standardized means for referencing in-memory objects, documents, data subsets, etc.
- an XBind is a three-dimensional data type comprised of an URL, base path (e.g., an XPath expression that may reference a fragment within an XML document or the entire XML document), and a selection (e.g., a plurality of XPath expressions).
- base path e.g., an XPath expression that may reference a fragment within an XML document or the entire XML document
- a selection e.g., a plurality of XPath expressions
- XBinds allow different parts of a loosely coupled system to efficiently communicate their state information in a standardized way.
- XBinds provide a simple and straightforward way of binding data to user interface components.
- the state of a component is capable of being described in an XBind which may be provided as input into other systems.
- each object within the network operating system environment can be queried at any time for an XBind that describes the object's state.
- an XBind describing the state of an object (e.g. component) may be set on a different object to “clone” or transfer the components' state.
- the XBind associated with an object may be synchronized over the network.
- objects executing on remote computers may be updated using an XBind to maintain synchronized states. This is one way in which aspects of the present invention enable real-time collaboration over the network.
- XPath evaluations may be applied by the expression engine.
- XPath is a standard of the World Wide Web Consortium (W3C) that provides a language for identifying and selecting data at a specified location in an XML document.
- W3C World Wide Web Consortium
- XPath establishes conventions for formulating expressions that evaluate particular values.
- the XPath expression “/tasks/task/@description” is used in the MyTasks application that includes the abbreviated syntax of the “@” symbol for selecting the attribute named “description.” This syntax complies with XPath conventions and is used to reference a subset of data in an XML document that fulfills a particular select or match parameter.
- the expression language provided by the present invention allows developers to reference in-memory objects that may experience state changes at runtime.
- the “#MyTasks” and “#MyTask#input3” expressions reference different view and component objects, respectively.
- developers are able to distinguish between references to these in-memory objects and their data bindings. For example, if a developer is accessing data bound to the “Input3” component instead of a reference to the object itself, the “ ⁇ #MyTasks#input3 ⁇ ” expression may be used. This particular expression will evaluate to the value found within the XML document referenced in the XBind associated with the Input3 that is within the MyTasks view.
- the expression engine Upon encountering an expression that contains curly brackets, the expression engine will convert one or more XML nodes bound to the identified object into text or XML.
- view and component objects provided by the present invention are aware of their data bindings and can always be queried for their XBind.
- the expression engine By evaluating expressions relative to an instance, the expression engine is able to identify the appropriate object and a corresponding data binding in evaluating these types of expressions. Accordingly, the expression language allows developers to reference both in-memory objects and their data bindings using the same straightforward notation.
- expressions may reference external resources identified by a URL that will be obtained automatically using a communication channel.
- aspects of the present invention allow in-memory objects and their associated data to be referenced using XPath conventions. Assuming a component named “Input1” exists within an application view called “MyView,” the following would be a valid expression that is evaluated by the present invention:
- XPath conventions are applied after the last “#” character in the expression relative to the components XBind.
- the base path or selection within the component will be merged with the supplied XPath as described with reference to the bind handling routine 1600 ( FIG. 16 ).
- the last “#” denotes that XPath expression (e.g., “@name”) is relative so that this XPath expression will be merged with the components' XBind.
- XPath expressions evaluated by the present invention may also be absolute.
- aspects of the present invention will ignore any base path or selection of the components' XBind. Aspects of the present invention utilize XPath conventions in other ways than those described above. Additional examples of the use of XPath conventions, as well as other types of expressions that may be evaluated by the present invention, may be found in the commonly assigned U.S. Provisional Patent Application No. 60/976,339, entitled “Network-Based Operating System,” filed Sep. 28, 2007, the content of which is expressly incorporated herein by reference.
- properties of an in-memory object may be accessed utilizing the expression language. These properties may be accessed regardless of their data type according to the following syntax:
- in-memory objects provided by the present invention may be encoded with methods. Utilizing the expression language, methods may be called directly on these objects. For example, the following are types of expressions evaluated by the present invention that would call a method on an object.
- the name of the Input1 component is evaluated first in the inner expression using the getName( ) method.
- the recursively evaluated expression identifying the component name is then provided as a parameter of the outer expression.
- process steps and associated operations may be performed in response to the occurrence of a trigger.
- the execution of process steps may be event driven.
- the trigger 602 is registered so that flow may be directed to the appropriate process step when the trigger is activated.
- a trigger activation routine 1700 will be described with reference to FIGS. 17A-B which illustrate both the flow and interactions between objects utilized to implement the routine 1700 .
- the MyTasks.xml document 600 defines the following trigger 602 .
- the trigger activation routine 1700 depicted in FIG. 17 assumes that a user selected the Button1 component identified within this trigger element, thereby activating the trigger 602 at block 1702 .
- the component object where the trigger occurred passes a notify listeners call to the event manager 914 , at block 1704 .
- the appropriate component object provides a set of event data and directs the event manager 914 to notify all event listeners that registered a notifier object or other object matching the supplied data.
- the Button1 component object 1750 associated with the MyTasks view object 1752 would pass a notify listeners call to the event manager 914 at block 1704 .
- an expression identifying the component where the trigger event originated e.g., “#MyTasks#button1”
- the event type e.g., “select”
- the event manager 914 alerts one or more listening objects to the activation of the event. Specifically, the event manager 914 performs a lookup in which the event data passed from the Button1 component object 1750 is matched to data previously provided when the event listener was registered.
- the process initiation routine 1100 FIG. 11 ) provides a description of how objects may register an event listener in the event manager 914 .
- each trigger encountered in a process XML document will cause a corresponding notifier object as an event listener to be pre-cached in memory when an application is initially launched.
- the notifier object is pre-cached in memory upon the initial launch of the application in anticipation that one or more application instances will cause the trigger to be activated.
- the pre-cached notifier object is associated with a view name, component name, and event type, which collectively serve as a unique key in performing the lookup at block 1706 .
- a view name e.g., a view name
- component name e.g., a view name
- event type e.g., a view name, component name, and event type
- only a single notifier object will register in the event manager 914 for a trigger defined in a process XML document regardless of the number of application instances that are executing. Even though multiple instances of an application exist, this architecture allows the same notifier object to be reused by each of the application instances.
- this architecture allows the event manager 914 to more efficiently iterate and notify listeners since only a single trigger registers an event listener in the form of a notifier object that is then shared by multiple applications instances. In other words, the performance of the lookup performed at block 914 is not dependent on the number of application instances that are executing.
- the appropriate instance that is associated with the activated event is identified.
- arguments are passed to the event manager 914 that are used to identify the appropriate listening object and the affected instance.
- the expression identifying the Button1 component object 1750 is supplied to the event manager 914 and may be utilized to identify the appropriate instance through accessing the components view object that holds a reference to the instance it belongs to.
- a reference to the instance is supplied to the resulting view object. Accordingly, the MyTasks view object 1754 is aware of its associated instance object 1758 .
- the Button1 component object 1750 may utilize the MyTasks view object 1754 to identify the appropriate instance, at block 1708 . Once the appropriate instance is known, the instance object 1758 is supplied to the execute method in the process object.
- the architecture depicted in FIG. 17B and the description provided above illustrates how the present invention is able to support stateless execution of process steps in a system that supports event-driven execution of application logic.
- a single process XML document is utilized to execute multiple applications instances.
- a process object may be repetitively re-used by different application instances thereby providing an efficient platform for executing applications.
- the present invention allows the appropriate instance to be supplied to the process object 1700 .
- the notifier object 1756 is activated when an event matching a unique key comprising the view, component, and event type is received by the event manager 914 .
- the event manager 914 is able to identify and provide the appropriate instance object 1758 to the notifier object 1758 utilizing the supplied component, view or event listening object.
- a call to execute a process step in an application is generated.
- the process step that will be executed is cached in the notifier object 1756 or known by the event listening object.
- the notifier object 1756 may call the execute method ( FIG. 12 ) at block 1712 supplying (1) the instance object 1758 that represents the current runtime state of the application, and (2) the process step (e.g., “2”) in the application's process logic that will be executed.
- the trigger activation routine 1700 proceeds to block 1714 , where it terminates.
- Other event listening objects may also call a process object step or directly execute its own custom code.
- the logic within the decision operation 620 performs a test to determine whether any text was entered into the Input4 component when the trigger 602 was activated.
- a decision handling routine 1800 that implements the Decision operation 620 will be described with reference to FIG. 18 .
- the decision handling routine 1800 begins at block 1802 where an expression is passed to the expression engine for evaluation.
- the Decision operation 620 contains a value attribute of “#MyTasks#input4” which would be passed to the expression engine for evaluation at block 1802 .
- developers may utilize the expression language provided by the present invention to reference in-memory objects.
- the “#MyTask#input4” expression selected and passed to the expression engine for evaluation at block 1802 references a component object that may experience state changes as an application executes.
- a determination is made regarding whether the expression being evaluated references a component that is associated with a data binding.
- a data binding may be defined in which data input and/or displayed by the component is automatically propagated between the component and the data model.
- a component may be “atomic” or not associated with an existing data binding.
- the expression engine may identify the component object named “Input4” using the instance. As mentioned previously, component objects provided by the present invention are aware of their data bindings. Accordingly, once the appropriate component object is identified, the expression engine may readily determine whether the component is atomic or associated with a data binding. If the result of the test performed indicates the component referenced in the expression is not associated with a data binding, then the decision handling routine 1800 proceeds to block 1808 , described in further detail below. Conversely, if the result of the test performed at block 1804 indicates that the expression references a component associated with a data binding, then the decision handling routine 1800 proceeds to block 1806 .
- the component referenced in an encountered expression is associated with a data binding.
- the expression is evaluated without creating a temporary XBind to account for the non-existence of a data binding. More specifically, the expression engine would evaluate the “#MyTasks#input4” expression at block 1806 and request the XBind from the Input4 component. In this example, the XBind returned by the expression engine would provide the operation handler with everything needed to execute.
- developers may provide XML semantic descriptions to access data and otherwise perform I/O.
- an expression may actually request data that is only available from an in-memory object implemented in a scripting language (e.g., Java Script).
- a component is not associated with a binding, the present invention allows expressions to operate and access data associated with the component using its corresponding in-memory object.
- the decision operation 620 in the MyTasks application includes the following “ ⁇ when>” XML element 622 .
- element 622 includes the XPath expression “text( )” which applies XPath evaluation conventions to request text entered into the Input4 component. Since the component is atomic, the requested data is not available using an existing data binding. Instead, the present invention evaluates XML-based expressions and allows data to be accessed even though the requested data is not currently maintained in the data model. Instead, a temporary XBind is created for the object (e.g., component) that references a fragment within a system-provided state document. As described in further detail below, the system-provided state XML document may contain all of the state information of the relevant component.
- the object e.g., component
- the system-provided state XML document may contain all of the state information of the relevant component.
- the requested data is obtained from an in-memory object associated with an atomic component.
- Logic implemented within an operation handler may utilize data that involves the state of an atomic component.
- the Input4 component is an atomic component that is not associated with a data binding.
- the XPath expression “text( )” within the body of the decision operation 620 requests data involving the state of the component that is not bound to a known document in the data model.
- the requested data should be available from the data model.
- the expression engine is able to query the Input4 component for the relevant data since the XBind requested in the expression does not exist.
- a system-provided state XML document is updated with the current state of the component.
- a temporary XBind may then be created that points to the appropriate fragment within the system-provided state XML document where the requested data may be obtained.
- the state of every component in the system (regardless of whether the component is atomic or associated with a data binding) may constantly be propagated to a system-provided state XML document utilizing the functionality encapsulated in a State Manager.
- the requested data would already be available from the data model and would be accessible using a translated XBind, as described below.
- this embodiment facilitates synchronization of an application's state across multiple client computers. Moreover, by automatically propagating state information to the data model in this way, the state of an application may readily be restored if the application is closed and subsequently opened.
- a temporary XBind for accessing data obtained from an atomic component is generated and returned to the appropriate process object.
- data may be obtained directly from the component object and stored in the system-provided state document.
- a translated XBind that is temporarily used to evaluate this expression is generated that references the location in the state document where the requested data may be obtained.
- the expression engine may generate an XBind that is similar to the following:
- the URL of this XBind references the system-provided state XML document allocated to store component state information. Moreover, the base path points to the node within the state document where the text entered into the Input4 component was stored, at block 1808 . Once evaluated, the temporary XBind is returned from the expression engine to the appropriate process object.
- references to objects e.g., components
- aspects of the invention allow components to bind to each other.
- the second component effectively “clones” the first component's XBind.
- the second component is provided with synchronized XBinds from the first component.
- Data binding between components are even possible when the target of the binding is an atomic component.
- the second component will be associated with an XBind that references the system provided state document describing the state of the first component. Since the first component is atomic, this will effectively create a master-slave relationship between the two components.
- a decision operation handler is called at block 1812 to perform the evaluation defined in the decision operation 606 .
- parameters are passed in the call to the decision operation handler that may include a temporary XBind if the operation involves an atomic component.
- developers are able to create operations in accordance with the operations API that define function call parameters and the XML semantic structure that may exist within the body of the operation.
- elements are defined that allow the flow of program execution to be directed based on the result of an evaluated XPath expression. In this example, a string comparison is performed within the decision operation handler to determine whether text was entered into the Input4 component.
- the XPath expression (e.g., “text( )”) is evaluated within the decision operation handler into text.
- the temporary XBind that is translated in order to evaluate a particular expression is used to obtain the requested data.
- the XBind passed to the decision operation handler may include a reference to the system-provided state document where state data previously extracted from the Input4 component is accessible.
- a call to execute the appropriate process step in the application is generated.
- the result of the evaluation performed within the decision operation handler determines whether to direct the flow of execution to either process step 608 or 610 .
- an XBind as well as process and instance objects are received. These received arguments allow the decision operation handler to readily initiate execution of the next appropriate process step based on the result of the evaluation. In this regard, the received arguments may be modified or directly passed by the decision operation handler.
- the decision handling routine 1800 proceeds to block 1816 , where it terminates.
- the decision operation 620 causes the flow of execution to proceed to process step 610 if text was not entered in the Input4 component upon the occurrence of the trigger 602 .
- the only operation in the process step 610 is the action operation 628 which will cause a button component to be displayed.
- the action operation 628 may be executed using the action operation handler described above with reference to FIGS. 15A-B . Accordingly, additional description of the functionality implemented when program flow is directed to process step 610 will not be described in further detail here.
- execution of the MyTasks application proceeds to the process step 608 .
- the operation defined within the process step 608 is a change operation 624 that will cause text input into a component to be added to an XML document.
- an exemplary change handling routine 1900 that implements the data update using a change operation handler will be described with reference to FIG. 19 .
- the change handling routine 1900 begins at block 1902 where an expression evaluation is performed. Specifically, the “data/tasks.xml” expression in the value attribute of the change operation 624 is evaluated into an XBind at block 1902 .
- the XBind that results from the evaluation will consist of a URL and base path that references the root node of the “data/tasks.xml” document.
- an expression in the value attribute of an operation is evaluated into an XBind for each operation in an application.
- expressions within the body of an operation may be evaluated within the logic implemented by an operator handler.
- expressions within the body of an operation may be evaluated before the appropriate operation handler is called. While both embodiments are supported, evaluation of expressions within the body of an operation in the logic of an operation handler is preferred since it is more efficient.
- the change operation 624 includes the following “ ⁇ store>” XML element 626 :
- the change operation implemented by the present invention provides developers with a raw data manipulation tool for performing all the necessary modifications to the contents of an XML document.
- a plurality of data manipulation primitives are provided that are in essence consistent with the World Wide Web Consortium's DOM standard.
- aspects of the invention provide additional data manipulation primitives that include the replaceText and delete children primitives.
- the following exemplary primitives may be performed to modify the contents of an XML document using the change operation provided by the present invention: replace, replaceText, append, prepend, insert, remove, remove children, new, and delete.
- replace, replaceText, append, prepend, insert, remove, remove children, new, and delete may be used and combined to perform all of the necessary modifications to the data model.
- any change operation affecting the data model will cause a transaction to be created within the transaction manager 910 , that describes the exact update that will be made.
- the change operation handler is called by the appropriate process object.
- the process object executing the current process is able to pass the previously evaluated XBind as well as the appropriate instance and process objects to the change operation handler.
- the change operation handler utilizes the received arguments to modify the contents of an XML document.
- the value attribute defined in the change operation 624 identifies the document that is the subject of the change operation (e.g., “data/tasks.xml”).
- the select attribute may contain an XPath expression (e.g., tasks/task/@description) referencing a location within the specified XML document where the data modification will be performed.
- the select attribute may include an expression (e.g., “ ⁇ #MyTasks#input4 ⁇ ”) that evaluates content that will be appended, replaced, or included in the XML document.
- aspects of the present invention allow data to be transformed within the change operation before being appended, replaced, or added to the data model.
- the store element 626 could include a transform attribute that references an XSLT (Extensible Stylesheet Language Transformation) for performing a particular data transform.
- XSLT Extensible Stylesheet Language Transformation
- the result of the test performed at block 1908 is “yes” and the routine 1900 proceeds to block 1910 .
- the change operation 624 in the exemplary MyTasks application does not include a transform attribute. In this instance, the result of the test performed at block 1908 would be “no,” and the routine 1900 would proceed to block 1912 , described in further detail below.
- a data transform is applied based on logic defined within a change operation.
- the store element in a change operation may include a transform attribute that references an XSLT document.
- Logic within the XSLT document may be applied to transform data from a source format into a destination format at block 1910 .
- XSLT has been used to transform data to support the dynamic creation and modifications of Web pages.
- XSLT is also used to transform between XML business format languages and their corresponding structures as part of Electronic Data Interchange (EDI) integration servers.
- EDI Electronic Data Interchange
- XSLT is an XML-based language for defining transforms between various markup languages (XML, HTML, XHTML, etc.) as well as between XML schemas and XML documents implementing different XML schemas or DTDs (Document Type Definition).
- an XSLT processor may be used by the change operation handler to apply the data transform, at block 1910 .
- a computer user will typically employ multiple applications such as e-mail, Web browsers, calendar applications, word processors, media players, and the like.
- applications such as e-mail, Web browsers, calendar applications, word processors, media players, and the like.
- data formats and logic used by different applications are seldom compatible using existing systems.
- an e-mail program may allow users to define a “contact” that is used to store and access information related to another user.
- a calendaring application allows users to create and track meetings and appointments involving other users, groups, etc.
- a user may want to automatically create a new meeting in the calendaring application.
- supporting functionality that allows different applications to interact in this way is not readily performed using existing systems.
- the data transform applied at block 1910 occurs before the raw data manipulation of the change operation is performed.
- a data transform may be performed that readily allows an e-mail and calendaring application to interact.
- an XSLT transform may be defined for converting a received e-mail and/or contact into a data item describing a new appointment.
- the transform may utilize the contact information, the content of an e-mail message, and/or input from the user to establish the attributes of the meeting.
- this type of XSLT transform may be applied that allows different applications to communicate even though different underlying schemas and XML structures are used.
- a call to perform the specific data update represented in the change operation is made to the appropriate URL object.
- a URL object provided by the present invention serves as a lightweight pointer that exposes methods for performing each of the different types of data modification primitives (described above) that are supported by the change operation handler. Accordingly, the change operation handler utilizes the received XBind and logic within the change operation 626 to identify the appropriate URL object to call. It should be well understood that the utilization of a URL object is merely implemented to obstruct the details of interaction with documents and the invention could readily be implemented in other ways.
- the data update routine 2000 depicted in FIG. 20 illustrates two instances beginning at blocks 2002 or 2004 where a data update is performed.
- a URL object receives a call to perform a data update within the context of a change operation handler 1250 .
- an application may include a change operation for modifying the contents of an XML document.
- the change handling routine 1900 FIG. 19 may generate a call to perform a data update on the specified URL object 1253 that is received at block 2002 .
- a call to perform a data update on the specified URL object 1253 originates from a user interface component.
- a component becomes aware of the URL and XML document associated with the binding.
- the Input3 component in the MyTasks application would receive a URL object corresponding to the “data/tasks.xml” document when the Bind operation 616 is executed.
- a Web browser that utilizes the HTML DOM may be employed to render a user interface.
- component objects created in the context of a corresponding view object cause various event listeners to be registered on the HTML DOM utilized by the Web browser.
- a component may listen for events affecting the HTML DOM that occur when, for example, a user provides input or otherwise interacts with the user interface displayed by the Web Browser.
- the component 1252 interprets the received data and generates a call to its URL object 1253 to cause a data update event to be implemented. For example, when the “Update Presentation” task is deleted in the exemplary MyTasks application, a URL object that corresponds to the “data/tasks.xml” document is created and called to delete the task description from the data model. As described in further detail below, the URL object 1253 will then communicate the data update to the transaction manager 910 .
- the transaction manager 910 will propagate the data update to the underlying XML document object that actually causes the data update to be implemented.
- the document object 1254 will cause the data update to be propagated to all the appropriate listening data update objects. These listening objects are frequently components but may be other types of objects.
- An XML document may be shared across remote computers that listen for changes that occur to the XML document object.
- the data update to the local document object 1254 maintained in client-side cache is implemented before the data update is propagated to any remote listeners. In other words, the full network update is performed subsequent to the data update being implemented locally.
- the transaction manager 910 is called, at block 2006 , which creates a new “transaction” or XML fragment that represents a relative change to an XML document.
- the transaction manager 910 includes information in the XML fragment for both implementing and reversing the relative change.
- an XBind serialized into XML is included with the transaction created at block 2006 .
- the transaction manager 910 causes the data update to be implemented both locally and propagated to any remote listeners. In either instance, an XBind is supplied that identifies the location in the data model where the data update will be performed and XML formatted data that contains logic for reverting the requested data manipulation operation, referred to herein as performing a “rollback.”
- the transaction manager 910 causes the data update to be implemented locally.
- a transaction may represent a session that consists of multiple and potentially different types of modifications to the data model. Accordingly, in a data notification event, one or more update event objects are created that represent a unit in which modifications to the data model are described. On the other hand, a transaction fully describes one or more changes being made to the data model and logic for reverting these changes.
- document objects provide methods for modifying the actual contents of an underlying XML document as represented in update event objects. Specifically, each data manipulation primitive that may be performed on an XML document (replace, append, prepend, insert, etc.) is implemented in corresponding methods provided by the URL object 1253 , the transaction manager 910 , and the document object 1254 .
- the transaction manager 910 calls the communication manager 1256 to propagate the transaction to any remote listeners.
- the communication manager 1256 allows applications to instantiate channels that abstract communications with remote network services. Based on the received XBind, the communication manager 1256 will identify the appropriate communication channel for transmitting the transaction over the network, if any.
- communication channels operate under different protocols as defined by the URL standard. For example, the appropriate communication channel may be identified in the protocol identified in the URL such as “http://,” “xios://,” or “database://.” Using logic obtained according to communicator APIs, the data received from the transaction manager 910 is translated into a format understood by a remote network service.
- logic for notifying and updating local data listeners is performed before, and independently from, a corresponding transaction being transmitted over the network.
- the present invention is configured to propagate transactions over the network asynchronously. As a result, execution of application logic locally is not hindered by network latency or other delays that are inherent in network communications. Then, once the transaction is provided to the appropriate channel, the data update routine 2000 proceeds to block 2014 , where it terminates.
- the transaction manager 910 causes transactions or data fragments that represent a relative change to documents stored locally to be propagated to any remote listeners.
- transactions originating with clients 2080 and 2082 are continuously transmitted to the XML file system 2084 maintained at a server-side data center.
- each of the clients 2080 and 2082 propagate the transactions 2086 - 2088 and 2090 - 2092 to the actively shared document 2093 .
- Any data updates to the document objects 2094 or 2096 performed locally in the client-side cache 2098 are identified and propagated to the XML file system 2084 so that the clients 2080 and 2082 are able to share data in real time.
- any rules associated with a component are applied and allocated a unique namespace in the data model.
- rules allow generic components to interpret, learn, and take appropriate action depending on the content in the data model. In other words, a rule using component does not need to be created for specific data models.
- the bind handling routine 1600 described above may determine that a particular component utilizes rules.
- the set rule routine 2100 described with reference to FIG. 21 may be called to apply and merge rules associated with the data binding of a new component.
- the unique XML namespace of a component's rules are merged into the data model and readily available to the components that are bound to the data model.
- the rules associated with the component may be stored remotely and accessible through Web services or additional XML documents.
- the set rule routine 2100 begins at block 2102 , and at decision block 2104 , a determination is made regarding whether a rule handler for the appropriate document is defined.
- rule handlers allow rules associated with different components to be executed relative to the same data.
- Each rule-using component bound to an XML document will provide logic (e.g., “rules”) to a corresponding rule handler maintained in the data model. Accordingly, if a component that utilizes rules was previously bound to the relevant document, then a corresponding rule handler will exist, and the routine 2100 proceeds to block 2108 , described in further detail below. In this regard, if multiple rule-using components are bound to the same document, the same rule handler is used for all of these components.
- routine 2100 proceeds to block 2106 .
- a new rule handler is created for holding the rules of each component bound to the same underlying data.
- FIG. 8A illustrates a tree component 800 that visually depicts the hierarchy of folders in a file system and includes folder names, icons, and the like.
- Rules may be defined that provide logic for populating a generic tree component with content that is maintained in the data model.
- aspects of the present invention may describe the contents of a file system in a folders.xml document in which each element in the document represents a different folder. Data associated with particular folders such as an identifier, icon, and the like may be identified according to attributes within a folder element.
- the following rules may be defined to interpret content in the folders.xml document for display in the tree component 800 depicted in FIG. 8A .
- the first rule element with the match attribute of “folder” and the display attribute of “@id” would cause the contents of the “id” attribute in the folders.xml document to be displayed as the folder name.
- the names allocated to folders in the tree component 800 depicted in FIG. 8A may be defined utilizing a rule.
- the rules provided above are merely exemplary and only include a subset of the logic that would actually be used to populate the content of the tree component 800 .
- a component's rules may be readily updated to account for the change.
- rule-using components will be notified of the changes in the same way as other data updates.
- an event update object may be created and used to notify the component of the changes utilizing the notify listeners routine 2200 of the data update event notification bus described in further detail below.
- a rule handler serves as an extension to the data model and manages the rules of different data binding components that are bound to the same document.
- namespaces may be allocated in the data model that separate the vocabularies of different rule using components or objects.
- the rule handler is invoked and causes the rules of each component bound to the relevant document to be executed.
- the rules associated with potentially multiple data binding components are executed relative to the current version of the data model.
- the component that is the subject of the bind operation is made aware of its corresponding assigned namespace by the rule handler.
- the rule handler passes a reference to the component associated with the new data binding that identifies the namespace in the data model allocated to the components' rules.
- rules associated with a component that is the subject of the bind operation are merged with the rules of other components.
- Developers may define the semantic logic of a component's rules utilizing the XML-based languages provided by the present invention.
- a rule may include XPath expressions, UI XML logic references, elements that describe other components, variables, aliases and other references to data outside the container of a rule namespace.
- data bindings of different components may have transitive relationships by virtue of their associated application and rule logic. Accordingly, the rules of different components working on the same underlying data are also maintained in the data model.
- a call is generated that causes a data update as reflected in the data model to be propagated to any data update listeners.
- document objects maintain a list of listeners that are notified in response to a data update.
- the corresponding listeners will be notified of the data update.
- the logic for notifying listeners of an update is described in further detail below with reference to FIG. 22 .
- the set rule routine 2100 proceeds to block 2114 , where it terminates.
- bindings were defined that caused a component to automatically display content maintained in the data model.
- developers are freed from having to provide logic in application code for setting and updating data on user interface components.
- the examples above are highly simplified and only reflect one exemplary aspect of the present invention. In this regard, bindings and their corresponding XBinds enable the implementation of more sophisticated functionality.
- FIG. 8A illustrates a tree component 800 that allows a user to navigate and select folders from a file system.
- a user selection may be described in an XBind, which provides a standardized variable format in the network operating system environment.
- the user made a series of selections to navigate to the folder entitled “video_encoding.”
- the state of the tree component 800 with regard to the selection of this particular folder may be described in the following XBind:
- the list component 850 displays file system data that may be based on a user selection made from the tree component 800 .
- the list component 850 could be configured to display documents (e.g., “whitepaper.txt,” “testresults.xml,” and “blog.html”) based on the folder selected in the tree component 800 .
- the XBind describing the selection is output to the shared data model by the tree component 800 . In turn, this XBind may be provided as input into other listening objects (e.g., the list component 850 ).
- the input provided to one object is interleaved with output previously persisted to the data model from a different object (i.e., the tree component 800 ).
- the implementation of an XBind provides a generic variable format that enables this interleaving of I/O in which values accessed from the data model depend on the values of previous I/O.
- the internal computational logic of objects that implement the XML virtual machine is decoupled from their interactions with other objects and systems.
- XBinds provide a standardized variable format that is used to model interactions and allow this decoupling.
- XBinds provided by the present invention does not contain values to requested data.
- XBinds reference locations where data can be obtained thereby allowing different objects and systems to work with the same underlying data.
- XBinds may also be transformed, merged, serialized for use an XML-based system.
- XBinds serve as a carrier of object state information utilizing the selection aspect of the XBind.
- the state information is communicated without altering or changing any of the referenced information or objects.
- the tree component 800 may utilize all dimensions of an XBind to describe a selection. For example, if the user were to select both the “whitepaper.txt” and “testresults.xml” documents in the tree component 800 , the selection may be described in the following XBind.
- components and other objects may be notified in response to changes in the data model.
- aspects of the present invention allow components to register as listeners for data updates performed on a particular document. When a data update occurs, each listener registered with the document object is notified of the data update and may update their user interface accordingly.
- a notify listeners routine 2200 that propagates data updates to listening components will be described. While the notify listeners routine 2200 is described with reference to listening component objects, this is merely exemplary as other objects may be data update listeners.
- the notify listeners routine 2200 begins at block 2202 where a data update is performed on an XML document.
- data updates to the data model may be performed in different circumstances.
- a user may generate input that is automatically persisted to the data model by the component.
- a data update may be performed as a result of executing application logic defined in a change operation.
- objects that implement the XML virtual machine perform data updates when using the shared data model and bindings as a communication interface. For example, the semantic description of a component's rules are persisted to the data model which allows different components to interpret the same underlying data.
- the rule handler associated with the document that experienced a data update is invoked.
- logic is implemented to ensure that the rule namespace as understood by each data binding component is current and to preserve the integrity of the data model.
- the data update performed at block 2002 may involve adding or otherwise modifying the logic in the rule handler.
- the set rule routine 2100 FIG. 21
- Any listening component bound to the same underlying document is notified within the notify listeners routine 2200 about the data update to the rule handler.
- the rule handler causes all rules as reflected in the current version of the data model to be executed. Then, the component associated with the new data binding is provided with current namespace information regarding the component's corresponding rules in the data model. However, since the addition of new rules may affect the bindings of other rule-using components, an update notification is also provided to these rule-using components. Accordingly, when invoked at block 2206 , the rule handler causes all of the rules as reflected in the current version of the data model to be executed. As a result, the rule handler is able to provide current namespace information and up-to-date rules to any listening component that is a rule user. In turn, this new data is set on the component, thereby causing the data update of the new rules to be reflected in the listening component's data binding.
- the “Update( )” method associated with a listening component is called at block 2208 . Since components are defined in accordance with a set of component APIs, the logic performed within the “Updated” method is configurable. In other words, each component will not implement the same logic within its “Updated” method. Instead, developers may adopt this logic and create new components that effectively extend the capabilities of the XML virtual machine. Accordingly, the description provided below is made with reference to components provided by the present invention and is merely representative of the logic that may be implemented within the “Updated” method.
- data updates are directed through the transaction manager 910 .
- One or more event update objects that represent an atomic unit for implementing the data update may be created and subsequently supplied in the call to the listening component's “Updated” method (received at block 2208 ).
- the notify listeners routine 2200 proceeds to block 2214 , described in further detail below. If an event update object is not received in the call to the “Updated” method, then the routine 2200 determines that an initial data update is being performed and proceeds to block 2212 .
- the user interface of the component is visually rendered using a complete representation of the underlying data bound to the component. If block 2212 is reached, an initial data update is being performed, and all of the data set on the component should be reflected in the component's user interface.
- a routine that causes XML formatted data to be rendered in a component's user interface is described in further detail below with reference to FIG. 23 .
- rendering may be performed using various technologies including, but not limited to, XSLT, JavaScript, HTML, VML/SVG or AdobeTM Flash.
- one or more event update objects may be provided when a listening component's “Updated” method is called.
- a received event update object that represents an atomic unit of describing a data update is selected for processing at block 2212 .
- logic is implemented that causes the data update, as represented in one or more event update objects, to be reflected in a listening component's user interface.
- the component or operation where the data update originated supplies an XBind that references the location in the data model affected by the data update.
- This variable that describes the change being performed to the data model is included in the event update objects that are propagated to each listening component.
- an XBind is also used to describe the binding of data to a listening component's user interface.
- the XBind describing the data binding of the listening component may be compared to the supplied XBind describing the data update.
- Utilization of a common variable format allows a listening component to perform a comparison and determine whether the user interface of the component is affected by the data update. If the results of this comparison indicates that the listening component is not affected by the data update, then the notify listeners routine 2200 proceeds to block 2222 , described in further detail below. Conversely, if the data binding of the listening component's user interface is affected by the data update, then the notify listeners routine 2200 proceeds to block 2216 .
- a common variable format e.g., XBind
- the present invention supports partial updates to the visual display of a component's user interface.
- the notify listeners routine 2200 proceeds to block 2220 , described in further detail below.
- the notify listeners routine 2200 proceeds to block 2218 , where the “Updated” method causes the component's user interface to be rendered based on all of the data reflected in the components data binding.
- a routine that causes XML formatted to be rendered on a component's user interface is described in further detail below with reference to FIG. 23 .
- a partial update to a component's user interface is performed.
- partial updates are supported, only the data in the components data binding that is affected by the data update is utilized to perform the partial update. Using the supplied XBind this data may be identified and set on the component, at block 2220 .
- the “Updated” method of the component causes the component's user interface to be rendered based on the partial update now reflected in the components data binding.
- the network operating system may be implemented on a client computer within the context of a Web browser, as a stand-alone application or as a machine operating system.
- a rendering routine 2300 will be described with reference to FIG. 23 that performs processing to graphically render and initialize the components and dialogs of an application. While specific reference is made below to specific Web browser technologies, it should be well understood that the present invention may be implemented without utilizing a Web browser. Moreover, in alternative embodiments, the rendering routine 2300 may be implemented differently to account for browser-specific variations. Accordingly, the description provided below with reference to FIG. 23 is merely exemplary and may be performed differently on various platforms.
- the rendering routine 2300 begins at block 2302 , where a view object is instantiated and called to render a new application view.
- the data type recognizer provided by the present invention may cause a new view object to be instantiated when an UI XML document is opened.
- the view object generates a request to obtain a new dialog object at block 2304 .
- a dialog serves as a frame for an application's components and includes controls for minimizing, expanding, and manipulating the visual representation of an application's view.
- a dialog manager is provided that is configured to recycle dialog objects, thereby reducing the amount of memory consumed. Accordingly, if a previously created dialog object is no longer being utilized but still maintained in memory, then an existing dialog object will be reassigned to the new application view.
- the view object is registered as a listener on a corresponding view.xml document. Similar to user interface components, a view object may register as a listener for data updates performed to the data model that describes the view. As described in further detail below, the view.xml document in which the view object registers as a listener will be updated when specified events that originate from the Web browser occur. Typically, the events will be user generated when input is provided or a user otherwise interacts with the system.
- an XML-based description of an application's user interface is transformed or converted into an HTML-based representation.
- the present invention allows developers to semantically describe the visual representation of an application's view using the UI XML programming language.
- the UI XML programming language does not have developers provide any computational or scripting logic. Instead, only abstract descriptions of graphical elements and their relations are provided in an application's UI XML document.
- an XSLT may be defined for transforming UI XML logic into HTML or other markup formats suitable for rendering by a Web browser.
- an object that contains the computational logic of a component is instantiated and associated with a corresponding view object.
- the UI XML document that describes an application user interface logic is traversed. Each component represented in the UI XML document is selected and a corresponding component object is instantiated.
- the present invention provides a separation between the computational logic of a component and its graphical representation. In other words, the UI XML description of the component's visual representation does not include any computational logic and may be transformed in various ways and for different platforms without impacting the component's behavior.
- the component object instantiated at block 2310 encodes the component's computational logic, which may be represented in a scripting programming language such as JavaScript, SilverLight, or AdobeTM Flash.
- developers do not define the component's behavior using the scripting language. Instead, developers define the desired behavior of the component using the UI XML language. If new components are needed, developers may create the new component in accordance with the component APIs.
- each component object implements certain methods that are based on information received in accordance with the component APIs. These methods include an “Initialize( )” method for setting data on the component and an “Update( )” method for performing updates to the component's user interface.
- the computational behavior of the component object instantiated at block 2310 is initialized.
- identifiers associated one or more components are included in the resulting HTML DOM document rendered by the Web browser.
- the appropriate references related to the component in the HTML DOM are identified by the view object using its view.xml document.
- the view object is able to instantiate the component objects corresponding to the generated HTML DOM and connect each component object to a corresponding user interface. In this way, a component's computational behavior and logic is invoked on the component's user interface.
- the rendering routine 2300 proceeds to block 2314 , where it terminates.
- the functionality performed by the rendering routine 2300 allows a view object to facilitate communications between XML-based applications and the HTML DOM utilized by a Web browser.
- the affected component and the view object may be notified and, after processing, propagate the event to the appropriate event listeners (e.g., triggers in a process XML document or event listening objects).
- the graphical representation of a component in the Web browser may be changed when a components corresponding “Updated” method is called, in a full or partial update, as described above.
- components may readily be configured to use rendering technologies other than HTML and still be aware of data updates and able to bind to data.
- components may be initialized and rendered using Adobe® Flash, Microsoft® SilverLight, Java® Applet, or any other rendering technology capable of being called within the computational logic of the XML virtual machine that executes each client-side components computational logic.
- the rendering routine 2300 described above may be performed in different ways when implementing the present invention on different types of computing devices. When a Web browser is not utilized, the user interface logic of an application may be rendered without performing a transform between XML and HTML at block 2308 .
- graphical primitives may be provided that are suitable for being implemented and called to render a component's user interface within the “Initialize( )” and/or “Updated” methods and built using traditional programming language like C, C++, Java or Microsoft® SilverLight.
- XIOS applications which are written for the network operating system, use the model-view-controller (MVC) model.
- MVC model-view-controller
- XIOS applications interact primarily with a data model, which is an abstraction of the contents of a data source. This layer of abstraction between a XIOS application and the data source allows the XIOS application to be insulated from changes made in the data source. In other words, changes in the data source do not necessarily require changes in the XIOS application.
- FIG. 24 illustrates an overview of one embodiment of how XIOS applications 2402 interact with a variety of exemplary data sources within this framework.
- the XIOS applications 2402 interact primarily with a data model.
- the XIOS applications 2402 interact with data models for a variety of data sources by interacting with XML documents that represent a data model of each data source.
- XIOS applications 2402 interact directly with a programming object exposing the data model as described above.
- the description below primarily relates to an embodiment in which XIOS applications 2402 interact with XML documents, but one skilled in the art will recognize that other implementations of the MVC paradigm may be substituted.
- the communication with a given data source is handled by the communication manager 2412 , which may be embedded in the system context object 902 ( FIG. 9 ) at runtime.
- the communication manager 2412 manages a set of communicator instances, each of which implements a communicator API 2410 .
- the communicator API 2410 exposes generic operations applicable to any given data source. For example, the communicator API 2410 allows a XIOS application 2402 to load, modify, create, or delete a document that represents connecting to a data source, modifying data stored in the data source, creating new data in the data source, query or removing data from the data source, and the like.
- the communicator API 2410 is built around the idea that any data source can be accessed using just a URL.
- a communicator implementing the communicator API 2410 enables access to its data via URLs, and returns XML documents that the XIOS applications 2402 can manipulate as a data model.
- a XIOS application 2402 using the returned XML document does not require any knowledge of a channel from which the document arrived, or the kind of underlying data source from which it is created. Having a unified way of using, manipulating, and creating data simplifies application development and implementation of the data abstraction solution.
- XIOS applications 2402 may also easily change from one data source to another and/or transform a data source.
- the communication manager 2412 instantiates a given communicator, thereby creating a channel, in response to receiving a request for a URL from a XIOS application 2402 .
- the name or type of the channel is provided as a URL protocol, and the rest of the URL provides information to the channel.
- the channel then handles the information in a channel-specific manner.
- a web search channel may accept a URL such as “websearch://example+search+terms”.
- the protocol “websearch” can instruct the communication manager 2412 to pass the URL to the web search channel, and the location “example+search+terms” can be used by the web search channel to build a search query to be submitted to a web search engine.
- a message in an inbox of an IMAP folder store may be accessed in a similar way via an IMAP channel when passed a URL such as “imap://servername/user1/inbox/message1”.
- a simple URL will be passed to a function of the communicator API 2410 as implemented by a particular communicator, such as a load function or a save function.
- an action URL may be passed to a communicator.
- Action URLs may be used in a communicator when there is a need to provide additional functionality apart from standard data reading/editing/writing/appending operations provided by the communicator API 2410 .
- the action URL can provide communicator-specific functions that use either the underlying data model, other resources, or the underlying data model along with other resources.
- One example could be an action URL that causes the communicator to perform complicated processing of an underlying data model, thus relieving the programmer from having to do this processing in program code.
- an action URL is similar to that of any other URL passed to the communicator API 2410 : “channel name://function(param1, param2, . . . param n),” where “channel name” determines the communicator to handle the action URL, “function” is used by the communicator to determine what processing to perform, and “param1, param 2, . . . param n” is a list of parameters to be passed to the function.
- a request for an action URL returns an XML document.
- FIG. 24 Three examples of data model documents, communicators, and data sources are shown in FIG. 24 .
- One example is a data model document 2404 and communicator 2414 used for communicating with a web search service 2426 , such as Google, Yahoo!, MSN Live Search, and the like.
- a XIOS application 2402 requests from the document manager 912 a web search model document 2404 , which abstracts the communication with the web search service 2426 .
- the document manager 912 uses the communicator API 2410 to communicate with the web search communicator 2414 as the XIOS application 2402 interacts with the web search model document 2404 .
- the web search communicator 2414 translates requests submitted through the communicator API 2410 into a format understood by a SOAP interface 2420 that exposes the functionality of the web search service 2426 .
- a XIOS application 2402 requests a URL such as “websearch://example+search+terms” from the document manager 912 , an XML document such as web search model document 2404 is returned that represents the search results.
- FIG. 24 Another example shown in FIG. 24 is an SQL model document 2406 .
- the XIOS application 2402 manipulates an SQL model document 2406 . Changes to this document cause the document manager 912 to make calls through the communicator API 2410 to an SQL communicator 2416 .
- the SQL communicator 2416 translates the calls from the communicator API 2410 into a format understood by an SQL web service 2422 .
- the SQL web service 2422 is a front end for an SQL API 2432 , which allows access to an SQL database 2428 .
- XIOS applications 2402 may request a document such as IMAP model document 2408 .
- the document manager 912 communicates with an IMAP communicator 2418 through the communicator API 2410 .
- the IMAP communicator 2418 translates requests from the communicator API 2410 to a format understood by an IMAP web service 2424 .
- the IMAP web service 2424 is a front end for a standard IMAP interface 2434 on an IMAP server 2430 .
- Each communicator instance such as web search communicator 2414 , SQL communicator 2416 , and IMAP communicator 2418 , is hosted by the communication manager 2412 of the client-side component 2400 .
- the communication manager 2412 is responsible for receiving requests from the document manager 912 that contain URLs, and for instantiating the necessary communicator to form a channel in response to each requests. For example, if the communication manager 2412 receives a request for a URL beginning with imap://, the communication manager 2412 will instantiate an IMAP communicator 2418 (if one is not currently instantiated) and pass the request to the IMAP communicator 2418 .
- a web-based front end such as SOAP interface 2420 , SQL web service 2422 , and IMAP web service 2424 .
- the client-side component 2400 communicates only with data sources accessible through HTTP, the client-side component 2400 receives the benefit of being able to reuse much existing communication functionality, such as functionality contained in standard web browsers, proxy servers, firewalls, and the like. However, it may also be possible to create a communicator that would not require an HTTP-enabled data source as a back end.
- the IMAP web service 2424 or the SQL web service 2422 could be removed, and the IMAP communicator 2418 and the SQL communicator 2416 could then communicate directly with the IMAP interface 2434 or the SQL API 2432 , respectively.
- FIG. 25 illustrates an overview of one embodiment of the XML file system server-side component 2500 .
- the client-side component 2400 comprises a data model, embodied in an XML-FS model document 2502 , made available to XIOS applications 2402 by the document manager 912 .
- the document manager 912 communicates through the communicator API 2410 with a XIOS communicator 2504 hosted by the communication manager 2412 as XIOS applications 2402 interact with the XML-FS model document 2502 .
- the XIOS communicator 2504 communicates with the server-side component 2500 .
- the server-side component 2500 comprises client interface components 2506 and data storage components 2514 .
- the client interface components 2506 are the primary components with which the XIOS communicator 2504 communicates.
- the XML web service 2510 (along with its web-based HTTP front end 2508 ) and the transaction coordinator 2522 are the primary ways the XIOS communicator 2504 communicates with the server-side component 2500 .
- the XML web service 2510 exposes functionality within the XML file system such as file creation, file retrieval, file deletion, file search, and the like.
- the transaction coordinator 2522 which will be discussed in more detail below, helps to coordinate changes to files in the data storage 2514 when more than one client is currently accessing the same file, and acts as a caching mechanism.
- the message server 2512 which will also be discussed in more detail below, is used to notify the client-side component 2400 , via the XIOS communicator 2504 , of changes in objects in the XML file system 2500 to which the XIOS communicator 2504 has subscribed.
- communication between the XIOS communicator 2504 and the XML web service 2510 is bidirectional.
- the XIOS communicator 2504 both sends information to, and receives information from, the XML web service 2510 .
- the message server 2512 primarily pushes information to the XIOS communicator 2504 .
- the data storage components 2514 comprise a file server 2516 , an index server 2518 , and a folder database 2520 .
- the XML file system stores file data in three separate parts.
- the raw data contained within the file is stored as a file on the file server 2516 .
- the filename, author, modification date, access control list (ACL), and other common file information associated with each file is stored within the folder database 2520 .
- the folder database 2520 also stores the folder hierarchy within which the files are organized, including ACLs for each folder and additional folder metadata such as related icons, folder rendering type (for example, indicating the folder contains pictures, and should therefore be rendered with picture thumbnails), and the like.
- the index server 2518 stores additional metadata used to identify and locate files, such as by searching the metadata using a full-text search.
- each of these components has been depicted as a separate component on a single server in FIG. 25 , one skilled in the art will recognize that one or more of these components may be hosted on separate physical hardware. Alternatively, one or more of these components may be split into multiple components, be duplicated within a server-side component 2500 , or have their functionality combined into a single component.
- the XML web service 2510 , the message server 2512 , the transaction coordinator 2522 , the index server 2518 , the file server 2516 , and the folder database 2520 may all be hosted on the same physical machine.
- the folder database 2520 may be separated from the rest of the components as a stand-alone SQL-based data store, or the file server 2516 may be located on a specialized high-capacity file storage system.
- the XML file system may include only one server-side component 2500 , or may include many.
- the XIOS communicator 2504 may always communicate with the same server-side component 2500 .
- the server-side component 2500 will then use information contained within the URL requested by the XIOS communicator 2504 to determine the appropriate XML web service 2510 , message server 2512 , and so on to service the request.
- the server-side component 2500 contacted by the XIOS communicator 2504 may also forward the request to a more appropriate server-side component 2500 altogether.
- the client-side component 2400 is insulated from the complexity of any load balancing, redundancy, or scaling architecture implemented by the server-side component 2500 .
- FIG. 26 illustrates one embodiment of some of the details of the content of the message server 2512 .
- the message server 2512 contains a subscription list for each client using the XML file system.
- FIG. 26 illustrates two clients: client one 2606 and client two 2608 .
- Client one 2606 is associated with a client one subscription list 2602
- client two 2608 is associated with a client two subscription list 2604 .
- Each subscription list contains a list of objects stored by the server-side components 2500 for which the client wishes to be notified when the object is updated.
- the client one subscription list 2602 indicates that client one 2606 wishes to be notified of changes to foo.doc (a file), bar.doc (also a file), changes to user 3's status, the group one folder list, as well as other objects and information stored by the server-side components 2500 .
- the subscriptions to foo.doc and bar.doc will cause the message server 2512 to update client one 2606 when either of these files are updated, deleted, renamed, opened by another client, or changed in some other way.
- the entry concerning user 3's status will cause client one 2606 to be updated when the status of user 3 changes, such as user 3 going online or offline, user 3 indicating he is busy, user 3 entering an idle state, and the like.
- the entry concerning the group one folder list will cause client one 2606 to be updated when folders that belong to the group one are updated, deleted, have items added to them, or are changed in some other way.
- the entries in the client two subscription list 2604 are similar to the entries in the client one subscription list 2602 and would behave in a similar way, but would cause client two 2608 to be updated as opposed to client one 2606 .
- notifications are sent by the message server 2512 via long polling, but other suitable techniques for pushing information to clients could be used instead.
- client one 2606 may, through the XIOS communicator 2504 , request to have an object added to a subscription list.
- the XIOS communicator 2504 adds the document to its internal subscription list, and in response, the document manager 912 (or another sub-component of the client-side component 2400 ) issues the request to the XML web service 2510 .
- the XIOS communicator 2504 communicates with the XML web service 2510 , which instructs the message server 2512 to add the object to a subscription list for client one 2606 .
- the message server 2512 creates a new subscription list for client one, such as client one subscription list 2602 .
- This list will be identified by a key 2610 .
- the key 2610 comprises a unique identifier, which is preferably difficult to guess.
- This key 2610 is then transmitted back to client one 2606 via the XML web service 2510 and the XIOS communicator 2504 so that client one 2606 is aware of the key 2610 .
- the XML web service 2510 and the message server 2512 simply work together to generate the key 2610 , which is then transmitted to client one 2606 .
- client one 2606 instructs the message server 2512 to add the object to the subscription list for client one 2606 .
- a client such as client one 2606 will be authenticated by the XML file system upon login to provide security. In one embodiment, this authentication is not duplicated between the message server 2512 and client one 2606 .
- the difficult-to-guess nature of the key 2610 in this embodiment in addition to the previous authentication, should provide adequate security against third parties eavesdropping on the client one subscription list 2602 .
- a further advantage of using the key 2610 to provide security for clients of the message server 2512 is that it reduces the load on the message server 2512 .
- FIG. 27 illustrates another aspect of one embodiment of the operation of the message server 2512 .
- the message server 2512 is depicted with three subscription lists: client one subscription list 2602 , client two subscription list 2604 , and client three subscription list 2702 .
- the transaction coordinator 2522 is notified when changes occur to monitored objects. The transaction coordinator 2522 then notifies the message server 2512 that the notifications should be sent to all clients subscribed to that object.
- a message chain 2704 is a linked list that associates each subscription list listening to a given object. For example, in FIG. 27 , the message chain 2704 links each subscription list on the message server 2512 that is listening to the object bar.doc.
- this message chain 2704 When the message server 2512 is notified that there is a change to bar.doc, the message server 2512 simply has to traverse the linked list of the message chain 2704 first by notifying client one, then by notifying client two, then by notifying client three. This removes the need for the message server 2512 to determine which of the multitude of subscription lists contain references to bar.doc, thereby saving processing time and increasing the efficiency of the message server 2512 . While only one message chain 2704 is depicted in FIG. 27 for simplicity, it will be understood that there may be one message chain associated with each object in the XML file system that is currently being monitored by a client.
- the XML file system stores the information representing the hierarchy of folders stored in the system in a folder database 2520 .
- a XIOS application 2402 may interact with the folder hierarchy via a folders.xml file retrieved by the XIOS communicator 2504 from the XML web service 2510 .
- FIGS. 28A-28D illustrate one embodiment of an exemplary method 2800 for retrieving a folders.xml file.
- the method 2800 proceeds to block 2804 , where a XIOS application 2402 creates a file request for a folders.xml file and submits the file request to the document manager 912 .
- the request comprises a folder identifier (“folder ID”) that both uniquely identifies a folder and provides information usable by the server-side component 2500 to indicate the location of a folder database 2520 in which the folder information is stored.
- the folders.xml file may contain information pertaining to the folder associated with the folder ID, and also information associated with subfolders within that folder.
- the folders.xml file may also contain additional metadata associated with each folder, as described above.
- the request submitted by the XIOS application 2402 takes the form of a URL.
- the XIOS application 2402 may simply request the folders.xml file from the document manager 912 , which will form a URL representing the request.
- the document manager 912 may already have a cached copy of the folders.xml file, in which case the document manager 912 will simply provide the cached copy of the document to the XIOS application 2402 . However, the remainder of this description assumes that no cached copy of the requested document exists within the document manager 912 .
- the method 2800 continues to block 2806 , where the document manager 912 obtains a XIOS communicator 2504 from the communication manager 2412 and passes the file request to the load function of the XIOS communicator 2504 .
- the method 2800 then proceeds to block 2808 , where the XIOS communicator 2504 transmits a request for the folders.xml file to the appropriate XML web service 2510 of the server-side component 2500 , the request comprising the folder ID.
- the server-side component authenticates the user, and routes the request to the XML web service 2510 .
- the method 2800 then proceeds to block 2812 , where the XML web service 2510 determines a folder database that hosts the folder tree associated with the folder ID, based at least in part on the content of the folder ID.
- the method 2800 then proceeds to a continuation terminal (“terminal A 1 ”).
- the method 2800 proceeds to block 2814 , where the XML web service 2510 queries the appropriate folder database 2520 to retrieve information associated with the requested folder. This retrieved information may include the folder access control list (ACL), and may also include additional folder metadata information.
- the method 2800 proceeds to a continuation terminal (“terminal B”) and then to block 2816 , where the XML web service 2510 adds the folder information to the folders.xml file.
- the folder information added to the folders.xml file does not include the folder ACL. Instead, the folders.xml implicitly indicates that the requesting user has at least read access to every folder in the folders.xml file.
- More detailed information concerning the ACLs of the folders may be obtained in this embodiment via a separate request. Examples of some of the advantages of this technique are that the size of the folders.xml file and the complexity of the processing performed by the server-side component 2500 are kept to a minimum.
- the folders.xml file being constructed by the XML web service 2510 contains information pertaining to only the folder identified by the folder ID.
- a request for the folders.xml file for a given folder will also return information pertaining to the subfolders of the requested folder. Since folder information for multiple folders—each of which might have different associated permissions (and therefore different ACLs)—will be returned to the client in a single folders.xml file, it is important that only information about folders having matching ACLs is included in a given folders.xml file.
- the method 2800 proceeds to block 2818 , where the XML web service 2510 queries the folder database 2520 to retrieve information associated with the immediate subfolders of the folder identified by the folder ID, including a folder ID and an ACL of each subfolder. Then, using the results of that query, the method 2800 proceeds to a FOR loop, beginning with block 2820 , and a continuation terminal (“terminal C”) that indicates the start of the FOR loop. From terminal C, the method 2800 proceeds to block 2822 , where the XML web service 2510 compares the ACL of the subfolder to the ACL of the requested folder. The method 2800 then proceeds to another continuation terminal (“terminal A 2 ”).
- the method 2800 continues to a decision block 2824 , where a test is performed to determine whether the ACL of the subfolder matches the ACL of the requested folder. If the answer to the test at decision block 2824 is YES, the method 2800 returns to terminal B, adds the current subfolder to the folders.xml file at block 2816 , and the method 2800 recurses on any further subfolders of the current subfolder. Otherwise, if the answer to the test at decision block 2824 is NO, the method 2800 proceeds to block 2826 , where the XML web service 2510 adds an XLINK that references the subfolder to the folders.xml file, as opposed to any further information concerning the subfolder. The method 2800 then proceeds to decision block 2828 , where a test is performed to determine whether there are any more subfolders.
- an XLINK provides the client with enough information to request a new folders.xml file containing the subfolder having a different ACL without exposing information to the client that would require a separate permission check. This is important because, as discussed above, the folders.xml file contains an implicit assertion that the client has at least read access to each folder contained within it. If a subfolder has a different ACL from the requested folder (e.g., if the subfolder is owned by a different user, if the subfolder is shared in a different group, etc.), this implicit assertion may not be true for the subfolder.
- the use of an XLINK allows minimal information about the subfolder to be provided to the client while still maintaining the truth of this implicit assertion.
- the method 2800 proceeds to continuation terminal C, and the next subfolder is processed. Otherwise, if the answer to the test at decision block 2828 is NO, the method 2800 proceeds to another continuation terminal (“terminal A 3 ”).
- the method 2800 proceeds to block 2830 , where the XML web service 2510 caches a copy of the complete folders.xml file to expedite future requests for the same folder (assuming changes are not made to the folder hierarchy between client requests, in which case the cached folders.xml file would be regenerated).
- the XML web service 2510 returns the complete folders.xml file to the XIOS communicator 2504 .
- the method 2800 then proceeds to block 2834 , where the XIOS communicator 2504 provides the folders.xml file to the document manager 912 .
- the document manager 912 caches the folders.xml file, and provides the folders.xml file to the XIOS application 2402 .
- the method 2800 then proceeds to a finish block 2836 and terminates.
- FIG. 28E illustrates one example of a folders.xml file 2840 produced by an embodiment of the above-described method 2800 .
- the XML file system 2500 stores a folder hierarchy, such as the folder hierarchy depicted in the tree component 800 of FIG. 8A , and a user has requested a folders.xml file for the folder “RESEARCH.”
- a set of line numbers 2842 is also depicted in FIG. 28E , included for ease of discussion.
- the method 2800 has created the folders.xml file 2840 in response to the request.
- Lines 1 - 4 of the file 2840 contain header information used to identify an XML version and schema for the remainder of the document.
- the method 2800 created an entry for the requested folder “RESEARCH” (at line 6 ), and then enumerated the subfolders of the requested folder to add any further folders with a matching ACL.
- the folders “PERSONAL,” “WORK,” and “LETTERS,” shown in FIG. 8A and at lines 7 , 8 , and 12 of the file 2840 , respectively, were found to have matching ACLs.
- the method also proceeded to add any subfolders of those folders that also have matching ACLs.
- the folders “PERSONAL” and “LETTERS” did not have any subfolders, but the folder “WORK” had two subfolders with matching ACLs, “BROWSERS” and “VIDEO ENCODING,” found at lines 9 and 10 .
- the method 2800 added limited metadata information to the file 2840 .
- the method 2800 added metadata including a “name”, an “id”, and a “type” for each folder, but in other embodiments, either more or less metadata may be added.
- the “id” elements are shown as integer values for the sake of simplicity, the “id” values may contain more complex information, as discussed above, to indicate the folder database 2520 storing the folder information. Alternatively, simple values such as the integer values may be used for the “id” elements, and a lookup may be performed to determine the folder database 2520 storing the folder information.
- the method 2800 also created an entry for the folder “EMAIL,” which does not have an ACL that matches the ACL of the “RESEARCH” folder.
- the entry for the “EMAIL” folder shown from lines 13 - 19 , contains minimal information about the folder, only showing its “name” element. It also contains an XLINK that may be traversed by the user to generate a new folders.xml file that contains the information for the “EMAIL” folder (as well as any subfolders having an ACL matching the “EMAIL” folder ACL).
- the folders.xml file contains information concerning the folder hierarchy, but not information about the individual files within the folders.
- FIG. 29 illustrates one embodiment of a method 2900 for retrieving a list of files in a given folder when the folders.xml file does not contain file list information. From a start block 2902 , the method 2900 continues to block 2904 , where a XIOS application 2402 creates a file list request and submits the file list request to the document manager 912 , the file list request comprising a folder ID of a specified folder. As described above, the folder ID contains information indicating a folder database 2520 that stores information about the contents of the specified folder.
- the file list request may also comprise further options, such as filters for desired file types, sorting preferences, date range filters, and the like.
- the method 2900 continues to block 2906 , where the document manager 912 obtains a XIOS communicator 2504 from the communication manager 2412 , and passes the file list request to the XIOS communicator 2504 .
- the XIOS communicator 2504 transmits the query to the appropriate XML web service 2510 of the server-side component 2500 .
- the method 2900 then continues to block 2910 , where the server-side component 2500 authenticates the user and routes the request to the XML web service 2510 , which checks the permissions on the requested folder 2910 .
- the XML web service 2510 may query the folder database 2520 to retrieve the ACL for the given parent folder, and determine whether the ACL grants access to the authenticated user.
- the method 2900 proceeds to block 2912 , where the XML web service 2510 determines an indexing server 2518 corresponding to the requested folder ID, and transmits a query to the indexing server 2518 .
- information contained within the folder ID may be used by the XML web service 2510 to determine the corresponding indexing server 2518 .
- the indexing server 2518 queries an index to retrieve a file list for the requested folder, and processes the result with respect to the ACL of each file in the list.
- the index of the indexing server 2518 is a full-text index of file information, and one of the indexed fields for each file contains the folder ID of the parent folder.
- the processing of the result with respect to the ACL of each file in the list ensures that only files for which the authenticated user has access are added to the folder list. In one embodiment, this processing is omitted in order to conserve processing time, and instead the user permissions are enforced when the user attempts to access one of the files.
- the indexing server 2518 formats the list of files returned by the index, along with limited file metadata retrieved from the index, as a feed in a suitable format (e.g., ATOM, RSS, or other suitable format), and returns it to the client-side component 2400 .
- the limited file metadata may include such items as the last modified date, the author, the file type, and the like. The method 2900 then continues to an end block 2918 and terminates.
- FIGS. 30A-30C illustrate one embodiment of a method 3000 for creating a file within the XML file system. From a start block 3002 , the method 3000 proceeds to block 3004 , where a XIOS application 2402 specifies a file name and a destination folder for the new file, and initializes a raw file data content.
- Initializing the raw file data content may create a new, empty file, or may insert existing content into the raw file data (such as when a user first saves content which she has already started to create).
- the XIOS application 2402 submits a file creation request to the document manager 912 , the file creation request comprising the file name, the destination folder ID, and the raw file data content. In one embodiment, at least part of this request is formatted as a URL.
- the method 3000 then proceeds to block 3008 , where the document manager 912 obtains a XIOS communicator 2504 from the communication manager 2412 , and passes the file creation request to the XIOS communicator 2504 .
- the XIOS communicator 2504 transmits a request to create a new file to the XML web service 2510 of the server-side component 2500 .
- the method 3000 then proceeds to block 3012 , where the server-side component 2500 authenticates the user, and routes the request to the XML web service 2510 .
- the method 3000 then proceeds to block 3014 , where the XML web service 2510 determines a folder database that hosts the destination folder, and checks that the user has permission to create the file in the destination folder.
- the folder ID of the destination folder contains information that allows the XML web service 2510 to determine a folder database that contains information associated with the destination folder.
- the XML web service 2510 may ensure that the user has permission to create the file by querying the folder database 2520 to retrieve the ACL for the destination folder, and determining whether the ACL grants the appropriate rights to the authenticated user.
- the method 3000 then proceeds to a continuation terminal (“terminal A 1 ”).
- the method 3000 proceeds to block 3016 , where the XML web service 2510 checks if the specified destination folder is a special folder.
- a storage folder is much like a folder in a conventional file system, in that it is primarily used to store files and other folders.
- a special folder is used by the XML file system to abstract another form of communication. This allows a XIOS application 2402 to interact with this other form of communication in the same way it would interact with a file in storage, thus simplifying application development.
- a special folder may be designated as an e-mail special folder, and creating a new file in the e-mail special folder would cause a piece of e-mail to be sent.
- the method 3000 continues to a decision block 3018 , where a test is performed to determine whether the specified destination folder is a special folder. If the answer to the test at decision block 3018 is YES, the method 3000 proceeds to block 3019 , where the request is transmitted to a server process associated with the special folder for further processing. One example of an embodiment of such processing is discussed below with relation to the method 3600 illustrated in FIG. 36 , and the accompanying text. The method 3000 then proceeds to a continuation terminal (“terminal B”).
- FIG. 30B illustrates that a method such as method 3600 occurs before the new file is created in the special folder, this need not necessarily be the case.
- the test performed at decision block 3018 may instead be performed after the file has been created, such as after terminal B ( FIG. 30C ).
- a server process that monitors the special folder would operate on the file created in the special folder, as opposed to operating directly on the request from the client. The server process could be notified of the creation of the file by polling the contents of the special folder.
- the server process could be notified of the creation of the file by creating a subscription list associated with the process on the message server, adding the special folder to the subscription list, and thereby receiving a notification from the message server about the creation of the file, for example at block 3030 of the method 3000 .
- a file server 2516 allocates space for raw file data of the new file in a storage location associated with the file server, and stores the initial raw file data at that storage location.
- a folder database 2520 creates an entry for the new file in the folder database, the entry containing limited metadata associated with the file, including the file name, date created, unique file ID, storage location, and the like.
- a file may have more than one file stream associated with a single file ID.
- the file server 2516 allocates a separate space in the storage location for each stream, and the metadata stored in the folder database 2520 associates the file ID with all of the storage locations.
- the XML file system exposes all of the streams associated with the file to the client through the available metadata of the file.
- the method 3000 then proceeds to block 3024 , where the folder database 2520 associates the new file with the specified destination folder.
- the association created between the parent folder and the new file will allow the XML web service 2510 to query the folder database 2520 and the index server 2518 using the folder ID to find the file when searching for the files contained within the folder.
- the method 3000 then continues to another continuation terminal (“terminal A 2 ”).
- the method 3000 continues to block 3026 , where the XML web service 2510 transmits metadata for the new file to an index server 2518 .
- This metadata may be the same metadata stored by the folder database, which is copied to the index server 2518 to facilitate fast full-text searching of the metadata.
- the metadata transmitted to the index server 2518 may also include further information beyond that stored in the folder database for which full-text indexing would be beneficial, such as user- or application-specified properties, author information, user comments, and the like.
- the metadata transmitted to the index server 2518 may also include information extracted directly from one or more file streams associated with the file.
- the XML web service 2510 transmits a notification to the message server 2512 that the new file was created in the specified destination folder. Alternatively, this notification may be sent by the folder database 2520 or the index server 2518 upon detecting the association of the new file with the parent folder.
- the method 3000 then proceeds to block 3030 , where the message server 2512 transmits an update notification to each client that has the specified destination folder in its subscription list.
- the client transmits a request to the message server 2512 through the XML web service 2510 to add the new file to the subscription list of the client, the request comprising the file ID.
- the message server 2512 adds the new file to the subscription list of the client. Then, the method 3000 proceeds to terminal B, and then to an end block 3036 , where the method 3000 terminates.
- FIGS. 31A-31E illustrate one embodiment of a method 3100 for opening existing files within the XML file system.
- the method 3100 continues to a set of method steps 3104 , defined between a continuation terminal (“terminal B”) and an exit terminal (“terminal C”).
- the set of method steps 3104 describes a method of opening an existing file that is not being shared (in other words, a file that is not currently opened by another client).
- terminal B FIG. 31B
- the method 3100 proceeds to block 3110 , where a XIOS application 2402 on a first client requests a file from the document manager 912 , the request comprising a file ID.
- the request is in the form of a URL.
- the request may comprise a file ID that is incorporated into a newly generated URL, or the first client may already have obtained a URL capable of addressing the file, such as a file URL included within a file list.
- the URL may not contain the file ID itself, but instead comprises information from which the file ID may be derived.
- the document manager 912 obtains a XIOS communicator 2504 from the communication manager 2412 and passes the file request to the XIOS communicator 2504 .
- the method 3100 then proceeds to block 3114 , where the XIOS communicator 2504 transmits a request for the file to an appropriate XML web service 2510 of the server-side component 2506 , the request comprising the file ID.
- the request may be in the form of a URL which comprises the file ID, or may instead comprise information from which the file ID may be derived.
- the server-side component 2506 authenticates the user, and routes the request to the XML web service 2510 .
- the file ID or the file URL contained within the request also contains information indicating a file server 2516 on which the file resides, to help the XML web service 2510 to determine an appropriate folder database 2520 , file server 2516 , or transaction coordinator 2522 for obtaining the file.
- the request may also include the folder ID of the parent folder, and the XML web service 2510 may determine the appropriate data storage servers for obtaining the file based on information contained within in the folder ID. The number of different servers that must be contacted for a single file request, and accordingly the amount of information provided in the file ID or file URL, depends on how the database is partitioned, and thereby the amount of scalability provided by the particular embodiment.
- the XML web service 2510 checks that the user of the first client has permission to open the file, and submits the request for the file to an appropriate transaction coordinator 2522 .
- the XML web service 2510 checks the client permissions by retrieving the ACL for the file from an appropriate folder database 2520 , and by checking if the ACL allows the authenticated user to access the file.
- the transaction coordinator 2522 instructs a message server 2512 to add the requested file to a subscription list of the first client.
- the method 3100 then proceeds to block 3119 , where the transaction coordinator 2522 determines if the file is currently shared.
- the method 3100 then proceeds to a continuation terminal (“terminal B 1 ”).
- the method 3100 proceeds to decision block 3120 , where a test is performed to determine whether the file is currently shared. If the answer to the test at decision block 3120 is YES, the method proceeds to a continuation terminal (“terminal D 1 ”). Otherwise, if the answer to the test at decision block 3120 is NO, the method 3100 proceeds to block 3122 , where the transaction coordinator 2522 queries an appropriate folder database 2520 to determine the file server 2516 storing the raw file data. Next, at block 3124 , the transaction coordinator 2522 retrieves the raw file data from the appropriate file server 2516 . Then, at block 3126 , the transaction coordinator 2522 returns the raw file data to the XML web service 2510 with the shared flag set to FALSE.
- the XML web service 2510 returns the raw file data to the XIOS communicator 2504 of the first client with a shared flag set to FALSE.
- the method 3100 then proceeds to block 3129 , where the XIOS communicator 2504 provides access to the raw file data to the document manager 912 , which in turn provides access to the raw file data to the XIOS application 2402 .
- the method 3100 then proceeds to another continuation terminal (“terminal C”).
- the method 3100 proceeds to a set of method steps 3106 defined between terminal D and terminal E, which describes a method of opening an existing file that is being shared by another client.
- this set of method steps 3106 assumes that the set of method steps 3104 has already been executed by the first client, and hence the requested file has already been opened by the first client.
- the method 3100 proceeds to block 3130 , where a XIOS application 2402 on a second client transmits a file request to the server-side component 2514 via the document manager 912 and XIOS communicator 2504 , the file request comprising the file ID.
- the request may be in the form of a URL comprising the file ID, or may be in the form of a URL comprising information from which the file ID may be derived. Since the individual actions that comprise the actions at block 3130 were described in detail above, those more detailed descriptions have been omitted here for brevity.
- the server-side component 2514 authenticates the user of the second client, and routes the request to the XML web service 2510 .
- the method 3100 then proceeds to block 3134 , where the XML web service 2510 checks that the user of the second client has permission to open the file, and submits the request for the file to an appropriate transaction coordinator 2522 .
- the method 3100 then proceeds to block 3136 , where the transaction coordinator 2522 instructs the message server 2512 to add the file to a subscription list of the second client.
- the transaction coordinator 2522 determines that the requested file is currently shared. At this point, the method for opening a file that is shared diverges from the method for opening a file that is not shared. The method 3100 proceeds to terminal D 1 , and then to block 3140 , where the transaction coordinator 2522 queries the folder database 2520 to determine the file server 2516 storing the raw file data. Next, at block 3142 , the transaction coordinator 2522 retrieves and caches a copy of the raw file data from the appropriate file server 2516 . Next, at block 3144 , the transaction coordinator 2522 instructs the message server 2512 to notify the first client that the file is now shared. The method 3100 then proceeds to another continuation terminal (“terminal D 2 ”).
- the method 3100 proceeds to block 3146 , where the transaction coordinator 2522 transmits the raw file data to the XML web service 2510 with the shared flag set to TRUE. This will notify the XML web service 2510 and the XIOS communicator 2504 to treat the raw file data differently than if the file was not shared.
- the XML web service 2510 returns the raw file data to the second client with the shared flag set to TRUE.
- the method 3100 then proceeds to block 3150 , where the message server 2512 notifies at least the first client that the file is now shared.
- the method 3100 then proceeds to block 3152 where, in response to receiving the notification that the file is now shared, the first client transmits any previously uncommitted transactions to the XML web service 2510 .
- the transaction manager 910 of the first client may gather these changes without immediately transmitting them to the XML web service 2510 for storage. This is especially likely if the first client was operating in an offline mode, but it may also occur due to high network latency, high processor load, and the like.
- the transaction manager 910 takes any uncommitted transactions and transmits them to the XML web service 2510 .
- the XML web service 2510 after receiving these transactions, transmits the uncommitted transactions to the transaction coordinator 2522 , which commits the unsaved transactions to the cached version of the raw file data that is stored by the transaction coordinator 2522 . These transactions will eventually be committed to the raw file data on the file server 2516 . In one embodiment, the transactions will be committed when a client holding the file executes a save command. In another embodiment, the changes will be committed after a certain time period. In yet another embodiment, the changes will be committed after all client users of the document have disconnected.
- the transaction coordinator 2522 instructs the message server 2512 to notify all listening clients of the committed changes. The method 3100 then proceeds to block 3158 , where the first client and the second client receive the notification of the committed changes from the message server. Next, the method 3100 proceeds to terminal E and terminates.
- FIG. 32A illustrates one embodiment of a method 3200 of starting a client-side component 2400 of a network operating system. From a start block 3202 , the method 3200 proceeds to block 3204 , where a boot loader of the client-side component 2400 instantiates the system context object 902 ( FIG. 9 ) with its associated managers and starts a communication channel to an XML file system 2500 . In some embodiments, the use of a boot loader is not required, since the XML virtual machine is already contained in the client-side component 2400 .
- the client-side component 2400 is implemented outside a Web browser as a stand-alone application, such as within a mobile device, on a set-top box or thin client component.
- the network operating system can work by retrieving files, including the files that define the startup process, over any network connection, including but not limited to using the HTTP protocol over the Internet. Even without the startup process described in method 3200 , the network operating system will operate, but any initial configuration will be driven by a user executing the configuration steps manually.
- client-side component 2400 may be hosted within another program, such as within an existing Web browser.
- particular settings concerning the startup sequence including which particular XML file system(s) 2500 to connect to or the communication channel to start, may be determined by a location URL navigated to using the host program, HTTP query parameters, HTTP cookies, or other configuration parameters associated with the client (such as IP, location, machine, browser ID, etc.).
- directing a Web browser to http://os1.icloud.com may cause the client-side component 2400 to connect to a first XML file system 2500
- directing a Web browser to http://os2.icloud.com may cause the client-side component 2400 to connect to a second XML file system 2500 hosted in a different location from the first XML file system 2500 .
- the client-side component 2400 may start a communication channel to a data source other than (or in addition to) an XML file system 2500 during the startup sequence, and may either connect to a remote data source or may access a local data source.
- a data source may be a global XIOS file system provided through a service provider data center.
- Another file system connected to during the startup sequence may be installed locally on an enterprise network.
- a third file system connected to during the startup sequence may give access to a user's local hard drive.
- FIG. 32B illustrates several examples of data sources bound by the client-side component 2400 during startup as drives.
- a drive of the local machine has been bound as “Local Drive.”
- a folder in an XML file system 2500 has been bound as “Shared Family Folder.”
- the root folder for a group has been bound as “Class of 1992 Reunion.”
- each of these data sources is stored in a different place and is accessed via differing techniques, the differences are hidden from XIOS applications 2402 , which would see each data source simply as an accessible drive. While these examples are not exhaustive, they are intended to show that the startup sequence may connect to one or more than one file system. Once a user is authenticated the startup sequence may be continued with a user-specific startup sequence that may include connections to additional file systems and the initialization of additional channels.
- Another difference between embodiments of the network operating system hosted within another program and a traditional operating system is that operations performed with respect to the host program may interrupt the execution of the client-side component 2400 . For example, after a user has successfully completed the startup sequence and is logged in to the network operating system, the host program may perform an operation to reload the client-side component 2400 . In some embodiments, the client-side component 2400 handles this situation by making the logged-in state of the network operating system before reloading available to the client-side component 2400 after reloading to restore its state. To that end, at block 3206 ( FIG. 32A ), the client-side component 2400 checks whether a user is already logged in.
- the method 3200 continues to a decision block 3208 , where a test is performed to determine whether the user is already logged in. If the answer to the test at decision block 3208 is YES, the method 3200 proceeds to a continuation terminal (“terminal A”), thereby skipping the login portion of the startup method.
- the method 3200 proceeds to block 3210 , where the client-side component 2400 opens a login application associated with the communication channel.
- the particular login application to be launched may be determined by the communication channel, but typically, a login application will securely request credentials from the user, such as a user name and a password.
- Other embodiments of the login procedure exist where the login information is requested before the boot loading has started, and that login information is directly passed into the communication channel for authentication without further user interaction.
- the client-side component 2400 may pass the login information directly into the communication channel for authentication.
- the communication channel processes the user credentials.
- the communication channel may process the user credentials by transmitting them to an authentication service, or by processing them locally.
- the method 3200 then proceeds to terminal A. From terminal A, the method 3200 proceeds to block 3214 , where the communication channel provides the user's settings.xml file to the client-side component 2400 , which uses the settings.xml file to perform a user-specific startup sequence and to mount all specified virtual drives.
- the communication channel may obtain the settings.xml file from a remote data source, obtain the settings.xml file from a local data source, or generate a default settings.xml file based on communication channel-specific defaults.
- the settings.xml file contains a collection of user-specific settings for configuration of the network operating system.
- settings may include, but are not limited to: a user name, an email address, settings for various applications, a collection of virtual drives (communication channels) and associated root folder IDs to be mounted upon startup (including groups, as discussed below), a list of friends, and a startup sequence.
- the startup sequence contained in the settings.xml file specifies what programs the client-side component 2400 should launch after a successful login, including which desktop manager, console, or start application to open, if any.
- the method proceeds to a finish block 3216 and terminates.
- the settings.xml file is more of a passive container of metadata representing various items in the network operating system
- the startup application plays a more central role in driving the startup sequence.
- the startup application is executed, and then executes a second application, such as a desktop application, to display a desktop to the user.
- a second application such as a desktop application
- the startup application may nevertheless determine which second application to execute by consulting the settings.xml file.
- groups are used to quickly and efficiently enable collaboration and file sharing between users.
- the creation of a new group and the enabling of collaboration and file sharing in the network operating system is very lightweight. For example, in one embodiment, a user need simply right-click to create a new group, which will automatically create a common storage folder and allow members of the group to exchange messages, create a new identity to interact with other members of the group, and collaborate with one another in real time.
- a group upon creation, stores a collection of group information.
- This group information includes a root folder ID, which acts as a reference to a storage location in an XML file system 2500 , as described above.
- the folders and files located at this storage location will be accessible only to members of the group.
- a settings.xml file is obtained for the logged-in user.
- This settings.xml file contains a collection of references to the groups of which the user is a member. Those references can then be used by the client-side component 2400 to mount the group as if it was any other storage location or file system by providing a reference to the desired group to the communication manager 2412 in order to launch the appropriate communicator and communication channel.
- FIG. 33 illustrates one embodiment of a method 3300 for mounting a network operating system group. From a start block 3302 , the method 3300 proceeds to block 3304 , where the client-side component 2400 starts a communication channel for the group. Next, at block 3306 , the communication channel processes user credentials associated with a user. The communication channel may prompt the user for any additional credentials specific to the group, such as a membership name and password, or it may reuse the user login credentials for an easy single sign-on. Assuming the communication channel was able to verify the user credentials, the method 3300 then proceeds to block 3308 , where the communication channel obtains the group folders.xml file using a root folder ID obtained from a user settings.xml file.
- the client-side component 2400 adds a reference to the group folders.xml file to an existing folders.xml file on the client.
- This reference may represent a virtual channel to the communication manager XML document, #CommunicationManager, which contains a list of all open communication channels on the client.
- the communication channel obtains an autostart.xml file for the group, if one exists, and the client-side component 2400 executes the instructions or applications specified in the autostart.xml file.
- This autostart.xml file allows a group administrator to specify common programs that will always be executed by a group member upon logging in to the group, such as auditing programs, welcome screens, common desktop configurations, a community representing the group, and the like. Groups may also specify alternative startup sequences that users may choose to have as their user startup sequence upon login to the system.
- the method 3300 then proceeds to a finish block 3314 and terminates.
- the method 3300 may also be used to mount file storage locations, as file storage locations have most of the same features of groups.
- File storage locations lack the concept of having associations that are members of the file storage location (as described above for groups), but the process for mounting the file storage location and accessing the files within it are quite similar.
- File storage locations may even include an autostart.xml file, as described above.
- Either group functionality or file storage locations may also be used to implement communities.
- a file storage location could be used for creating communities, with no specific membership required. In other words, all users would automatically be members of the community.
- Group functionality on the other hand, could be used to create membership-only communities.
- the group information described above may also include a collection of memberships.
- a membership is an association between a user and a group, and represents the fact that the user is a member of the group.
- Each membership may have an associated name, which will be shown to other members of the group, thus creating a new identity for the user when interacting within the group. Since the membership names may be created by a user when joining a group, users may be able to join groups with widely varying subject matter while keeping their privacy. For example, a group named “Group One” might have a collection of memberships indicating that a user with the username “Alice” and a user with the username “Bob” are both members of Group One.
- the first membership indicating that Alice is a member of Group One, may be the same or similar to Alice's username, such as “AliceGroupOne.”
- the second membership indicating that Bob is a member of Group One, may be different from Bob's username, such as “AnonymousGroupMember.”
- the messaging services are capable of handling multiple identities of users in its inter-user communication. This is also true for the friends handling of the system, in that one user can have the same friend in his friends list as two different entries, without knowing that it is actually the same person. The user would also receive different instant messages from the two different entries without knowing that they are both sent by the same person.
- the client-side component 2400 is capable of working in both a normal, online state, and in an offline state wherein the client-side component 2400 does not have access to any server-side resources.
- One advantage of providing this functionality in the client-side component 2400 is that it helps the client-side component 2400 seamlessly support a single application operating in both online and offline modes while minimizing the amount of work required of the application developer to support both modes.
- FIG. 34 illustrates one embodiment of a method 3400 for transitioning the client-side component 2400 of a first client from an online state to an offline state.
- This method 3400 assumes that the client-side component 2400 of a first client has previously started up and connected to an XML file system 2500 via a method such as method 3200 . From a start block 3402 , the method 3400 proceeds to block 3404 , where the client-side component 2400 of the first client sets a status of the first client to an offline state by sending a notification to the XML web service 2510 of the XML file system 2500 . This status can then be checked by other clients using the same XML web services to determine that the first client is offline.
- the XML web service 2510 instructs the message server 2512 to send a notification to all other clients subscribed to the status of the first client that the first client is offline.
- the other clients connected to the XML file system 2500 that are associated with the same group as the first client will have added the first client to their subscription list on the message server 2512 .
- the notifications are sent out by the message server 2512 in essentially the same way as notifications concerning file updates, which are described in more detail above.
- the client-side component 2400 In order for the client-side component 2400 and the applications executed by the client component 2400 to continue to function without having access to the XML file system 2500 , the client-side component 2400 must cache any necessary resources from the XML file system 2500 on the first client. To this end, the method 3400 proceeds to block 3408 , where the application manager 904 of the first client downloads all outstanding, not already downloaded resources indicated in an application package associated with each instance currently being executed by the client-side component 2400 .
- An application developer may indicate in the application package which resources should be cached by the client-side component 2400 to enable offline use of the application. Alternatively, the client-side component 2400 may automatically determine what resources should be cached by analyzing the references used by components of the application package.
- the application manager 904 may perform additional, optional steps for determining what resources should be cached on the first client. For example, the method 3400 may proceed to block 3410 , where the application manager 904 of the first client downloads any resources dynamically loaded by each instance. These resources would not be referenced by the application package associated with the instance, but would instead be determined by the instance while executing. The method 3400 may then proceed to block 3412 , where the application manager 904 of the first client downloads resources associated with each open view file. As with the dynamically loaded resources, each open view file may be associated with resources that are not referenced by the application package. The method 3400 may also proceed to block 3414 , where the application manager 904 similarly downloads resources associated with each process.
- blocks 3410 - 3414 are optional, one, more than one, or none of the blocks may be executed in embodiments of the method 3400 .
- the method 3400 then proceeds to block 3416 , where the client-side component 2400 of the first client sets a system flag that indicates the first client is offline. This system flag may be used to change the behavior of both the client-side component 2400 and the applications executed on the first client. For example, in one embodiment, the method 3400 continues to block 3418 , where the client-side component 2400 of the first client queues subsequent file operations, and each channel of the first client caches subsequent transactions describing modifications to files, instead of immediately transmitting file operations and transactions to the XML file system 2500 . Since the client-side component 2400 queues file operations and caches transactions while offline, it can appear to a user of the network operating system that no change has taken place when the first client goes offline.
- Applications executed by the client-side component 2400 may also change their behavior based on the system flag, such as by disabling functionality that requires network connectivity.
- the client-side component 2400 itself may change its behavior further, such as by displaying an error message if a user of the first client tries to perform an action that requires network connectivity.
- the method 3400 then proceeds to a finish block 3420 and terminates.
- FIG. 35 illustrates one embodiment of a method 3500 of coming back online when a first client has already executed a method, such as method 3400 , and has been operating in an offline state.
- the method 3500 proceeds to block 3504 , where the first client goes online, and the client-side component 2400 of the first client sends a notification of an online state to the XML web service 2510 .
- the first client may go online by establishing or re-establishing a connection to one of, but not limited to, a local-area network, a wireless network, a dial-up network, and the like.
- the first client may go online when a user indicates a desire to go online, when the network connection has already been established.
- the XML web service 2510 instructs the message server 2512 to send a notification to all clients subscribed to the status of the first client that the first client is online.
- the method 3500 then proceeds to block 3508 , where the transaction manager 910 of the first client downloads any changes to documents cached on the first client from the XML web service 2510 .
- these downloaded changes are changes made to the documents in the XML file system 2500 by other clients while the first client was offline.
- the transaction manager 910 of the first client resolves any conflicts between the cached documents and the downloaded changes.
- the transaction manager 910 merely detects that a conflict exists, and prompts the user to manually resolve the conflict (by creating a new file to contain the cached changes, to cancel the cached changes in favor of the downloaded changes, etc.).
- the transaction manager 910 executes an algorithm that decides which changes should be retained and which should be discarded.
- the transaction manager 910 of the first client transmits any queued file operations to the XML web service 2510 .
- the file operations will be transmitted to the XML file system 2500 at this point.
- the XML file system 2500 will detect any conflicts with changes made by other users (such as an attempt to rename a file that was previously deleted, etc.) and respond appropriately.
- the method 3500 then proceeds to block 3514 , where the client-side component 2400 of the first client contacts the message server 2512 , through the XML web service 2510 , to re-add any monitored objects to the subscription list of the first client.
- the client-side component 2400 of the first client sets a system flag that indicates the first client is online. In one embodiment, setting this system flag returns the client-side component 2400 and the applications to their normal, network-connected state of operation.
- the method 3500 then proceeds to a finish block 3518 and terminates. At this point, the XML file system of the first client is then synchronized to the server-side component 2500 of the network operating system and is online.
- certain folders in the XML file system 2500 may be designated as special folders.
- an entry for a special folder is stored in the folder database 2520 in the same way as an entry for a regular folder, but with a flag set to indicate that the folder is a special folder.
- the entry in the folder database 2520 for the special folder also contains an indication of one of many server process that handles requests to create files in the special folder.
- one server process handles all requests to create files in the special folder, and determines how to handle the file based on the content of the file, such as a file type of the file.
- special folders instead of providing file storage, may serve as an abstraction for some other data handling routine, such as asynchronous messaging between users.
- asynchronous messaging would be the use of an outbox folder for receiving and handling outgoing messages intended for other users.
- the use of special folders for inter-user communication provides many advantages. For example, it simplifies client application development.
- a XIOS application 2402 may utilize the messaging protocol associated with the special folder by simply using familiar file creation routines, and need not struggle with the underlying details of the communication protocol.
- the use of special folders for inter-user communication allows a XIOS application 2402 to leverage the group functionality included in the XML file system 2500 , as described above.
- a XIOS application 2402 using special folders for messaging does not need to add extra code for implementing security, group membership, friend lists, addressing, anonymity, or the like, as it may simply rely on the underlying functionality of the XML file system 2500 for such features.
- FIG. 36 illustrates one embodiment of a method 3600 of handling a request to create a new file in an outbox special folder. While such a request would look to a XIOS application 2402 executing on a client as if it were a request to create a file, the server will treat the request as a request to send a message to a second user. From a start block 3602 , the method 3600 proceeds to block 3604 , where a server process associated with an outbox folder of a first user receives a request to create a new file in the outbox special folder. Next, at block 3606 , the server process extracts an address of an intended recipient from the request. The method 3600 then proceeds to block 3608 , where the server process identifies a second user associated with the address of the intended recipient.
- the group and friend list functionality of the XML file system 2500 described above allows multiple different types of addressing to identify the second user.
- the first user may address the message directly to a user name of the second user.
- the first user may address the message to a membership name that is associated with the second user. In this case, the anonymity of the second user would be protected, but the first user would still be able to address messages to the second user.
- the first user may address the message to an address stored in the metadata associated with the second user, such as a phone number. The server process will determine which type of addressing has been used, and will identify the second user accordingly.
- the server process determines an inbox folder ID of the second user. In one embodiment, this simply involves searching the folder database 2520 for an inbox folder associated with the second user.
- the method 3600 then proceeds to block 3612 , where, using the inbox folder ID, the server process creates a new file in an inbox folder of the second user, the new file containing the data included in the request. In embodiments where the file has been created in the special folder (as opposed to the server process directly handling the file creation request), the server process simply moves the new file from the outbox folder of the first user to the inbox folder of the second user.
- the method 3600 proceeds to an end block 3614 and terminates.
- one advantage of the network operating system is that the features embedded in the network operating system make it possible to rapidly develop reusable, scaleable, cross-platform, collaboration components that contain rich security and anonymity functionality.
- One embodiment of an exemplary application that takes advantage of many of these features is a chat application, described below.
- FIG. 37 illustrates, at a high level, one embodiment of a chat application 3700 and its corresponding shared data file 3710 .
- the chat application 3700 performs communication between participants in a chat conversation through the use of a shared data file 3710 residing in the XML file system 2500 .
- the interface of the chat application 3700 comprises four primary components: a host window component 3712 , a text display component 3702 , a text entry component 3704 , and a button component 3706 .
- the text display component 3702 Upon the start of a chat conversation, the text display component 3702 is bound to the shared data file 3710 via a binding 3708 , such that changes made to the shared data file 3710 by any participant in the chat conversation will be reflected in the text display component 3710 (this text is omitted from FIG. 37 for clarity).
- FIG. 38 illustrates, at a high level, that the text display component 3702 and the button component 3706 of one embodiment of a chat application 3700 are also bound to the shared data file 3710 .
- the change is made in the shared data file 3710 . This change will then be propagated to all components bound to the shared data file 3710 , including text display component 3702 .
- FIG. 39 illustrates, at a high level, the updating of the shared data file 3710 in a chat conversation between a chat application of a first user 3902 and a chat application of a second user 3904 .
- the text display component 3702 of the chat application of the first user 3902 and the text display component 3702 of the chat application of the second user 3904 are bound to the shared data file 3710 , and therefore display the contents of the shared data file 3710 .
- the first user has input text into the text input component 3704 , and has clicked the button component 3706 .
- the button component 3706 is associated with a trigger which, when the button component is clicked, causes steps to execute that read the text from the text entry component 3704 , append the text 3906 to the shared data file 3710 , and clear the text from the text entry component 3704 .
- This procedure for updating the shared data file 3710 helps to show at least one advantage of the network operating system, in that a developer must merely associate the four components described above, and create the rule bound to the text entry component, to enable this functionality. Behind the scenes, the network operating system will handle numerous details of updating the shared data file 3710 .
- a cached copy of the shared data file 3710 is stored in the client-side cache maintained by the document manager 912 .
- a corresponding URL object receives the request to update the shared data file 3710 , which causes the transaction manager 910 to create a transaction representing the changes.
- the transaction manager 910 propagates the transaction to remote listeners by causing the transaction to be submitted to the XML web service 2510 via the XIOS communicator 2504 and the XIOS channel.
- the XML web service 2510 notes that the file is shared, and forwards the submitted transaction to the transaction coordinator 2522 .
- the transaction coordinator 2522 then commits the transaction, updating the shared data file 3710 within the XML file system 2500 .
- FIG. 40 illustrates, at a high level, the transmission of the chat messages via propagation of changes to the shared data file 3710 in one embodiment of the chat application 3700 .
- the text display component 3702 of both the chat application of the first client 3902 and the chat application of the second client 3904 are bound to the shared data file 3710 .
- each of the bound components is notified of the changes and is updated accordingly.
- this allows the developer to have UI components that automatically, through data update event propagation, always display the correct information synchronized with the shared data file 3710 , and thereby complete the chat communication without writing any code, but instead by simply binding the component to the shared data file 3710 .
- the network operating system handles numerous details of this transaction. For example, in one embodiment, when the transaction coordinator 2522 commits the transaction, it instructs the message server 2512 to notify each client that is subscribed to changes in the shared data file 3710 that the shared data file 3710 has been updated. The message server 2512 sends those notifications to each client, which either extracts the updated information from the notification or contacts the XML file system 2500 to obtain the latest version of the file.
- the transaction manager 910 of the first client will recognize that the changes were submitted by the first client, and will not repetitively update its cached version of the shared data file 3710 .
- the transaction manager 910 of other clients will cause the changes to be incorporated into their respective cached versions of the shared data file 3710 .
- any listening components will then be notified that the file has been updated, including the text display components 3702 of the chat application of the first client 3902 and the chat application of the second client 3904 .
- the text display components 3702 will then automatically be updated accordingly with the added content 3906 .
- FIG. 41 illustrates an additional feature enabled by using a shared data file 3710 for collaborative communication between clients. That is, as updates to a given shared data file 3710 are propagated to any number of clients subscribing to the shared data file 3710 , no extra work is required to enable collaborative communication between more than two participants. As illustrated in FIG. 41 , the conversation between the first client 3902 and the second client 3904 can be joined by any number of other clients, such as a third client 4102 and a fourth client 4104 , without any further design changes. Each client will bind to the shared data file 3710 and receive updates as described above.
- a first user may only send or receive chat messages from a second user who is a member of a friend list of the first user and who has consented to chat communication with the first user.
- the friend list of the first user may be stored in a document in the XML file system 2500 , or may be stored and transmitted as part of the settings.xml file.
- the first user must first search for the user.
- the first user will only be able to search membership names, each of which is associated with a user and a group to which the first user belongs. In one embodiment, the first user will also be able to search a global group, in which there is an indication of the actual name of the user, but no connection to names found in groups.
- the search will return to the first user an address associated with the second user.
- the first user will then send a request to the address of the second user to add the second user to the first user's friend list.
- this is done using a method similar to the method 3600 described above, wherein the first user creates a file in the first user's outbox folder that constitutes the friend list request, which is then routed and transferred to the second user's inbox folder by a server process.
- the request is retrieved from the inbox of the second user, and a dialog is displayed asking the second user whether or not she wishes to allow the first user to add her to his friend list.
- a message is sent back to the first user in similar fashion to complete the addition of the second user to the friend list of the first user, and the first user will then be able to start chat conversations with the second user.
- the chat application of the first user creates a shared data file 3710 , binds its text display component 3702 to the shared data file 3710 , and sends a request to the address of the second user to begin a chat session.
- the request is delivered as described above. If the second user accepts the request, a notification is sent to the chat application of the first user, which then sends the document ID of the shared data file 3710 to the chat application of the second user.
- the chat application of the second user binds its text display component 3702 to the shared data file 3710 , and the chat conversation may proceed as described above.
- server-mediated communication such as message boards, email, and the like
- shared data files could be used to coordinate other forms of communication that do not require a server for mediation.
- a first user and a second user could use a shared data file to negotiate bandwidth settings, encryption settings, and the like for peer-to-peer communication, such as VOIP or video conferencing.
- chat assumes that the chat application is handling all messages that arrive in the inbox folder for the sake of simplicity, it is possible that an additional component on the client manages incoming messages.
- a component on the client analyzes each message that appears in the inbox folder, and determines an appropriate application for handling the message. The component then launches the application and passes the message to the application for further processing. In this way, incoming chat requests or buddy list requests could be handled without having the chat application already running.
- FIG. 42 illustrates another advantage of the use of reusable components in creating XIOS applications.
- the figure illustrates one embodiment of the network operating system hosted within a web browser, and may also be representative of how the network operating system may look in other embodiments, such as a stand-alone application or a machine operating system implementation of the client-side component 2400 .
- Each of the boxes within the web browser represents a XIOS application 2402 created with reusable components, such as an email component, a clock component, a web search component, a group message component, and a weather report component.
- the box in the lower right shows the reuse of the chat application components within this web browser, as opposed to merely within a stand-alone chat application.
- FIG. 43 illustrates an example collaboration application easily created using embodiments of the system.
- the Class of 1992 Reunion application is one example of functionality that could be presented to members of a group. As described above with respect to FIG. 42 , FIG. 43 illustrates a collection of components that refer to multiple data sources. What is illustrated by the Class of 1992 Reunion application is a collection of components that could be launched as part of an autostart.xml file loaded when binding a group folder. As shown above in FIG. 32B , the Class of 1992 Reunion group folder may be bound by a client as a data source, in which case it would be displayed as a drive within the user interface.
- an autostart.xml document associated with the group folder will cause the collection of components, such as the Schedule of Events, the Map to Reunion Events, the Countdown to Reunion, etc., to be displayed.
- the group functionality will also provide security. For example, only members of the group will be able to view entries in the Photo Album, which may simply be a view of a folder stored within the group folder hierarchy.
- the group functionality will also provide easy collaboration with other members of the group, as shown in the Chat component of FIG. 43 , which shows other online members of the group without first requiring the user to add the other group members to a friend list.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Information Transfer Between Computers (AREA)
- Devices For Executing Special Programs (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Stored Programmes (AREA)
- Document Processing Apparatus (AREA)
Abstract
Generally described, the present invention is directed to a network operating system that provides more effective ways of leveraging the connectivity of computer networks. In one embodiment, an XML virtual machine is implemented that accepts high-level application code written in an XML programming language as input. Functionality is provided to interpret or translate the application code written in an XML programming language into code that is suitable for execution across computer platforms. Moreover, the XML virtual machine supports the Model View Controller (MVC) design paradigm that facilitates true data abstraction from applications to a common data model. Multi-instance applications, with each instance potentially supporting multiple views, may be created and executed.
Description
- This application is a continuation of U.S. application Ser. No. 12/240,888, filed Sep. 29, 2008, now U.S. Pat. No. 9,071,623, which claims the benefit of the following: Provisional Application No. 60/976,216, filed Sep. 28, 2007; Provisional Application No. 60/976,222, filed Sep. 28, 2007; Provisional Application No. 60/976,246, filed Sep. 28, 2007; Provisional Application No. 60/976,249, filed Sep. 28, 2007; Provisional Application No. 60/976,252, filed Sep. 28, 2007; Provisional Application No. 60/976,258, filed Sep. 28, 2007; Provisional Application No. 60/976,266, filed Sep. 28, 2007; Provisional Application No. 60/976,269, filed Sep. 28, 2007; Provisional Application No. 60/976,275, filed Sep. 28, 2007; Provisional Application No. 60/976,281, filed Sep. 28, 2007; Provisional Application No. 60/976,283, filed Sep. 28, 2007; Provisional Application No. 60/976,292, filed Sep. 28, 2007; Provisional Application No. 60/976,301, filed Sep. 28, 2007; Provisional Application No. 60/976,304, filed Sep. 28, 2007; Provisional Application No. 60/976,308, filed Sep. 28, 2007; Provisional Application No. 60/976,311, filed Sep. 28, 2007; Provisional Application No. 60/976,312, filed Sep. 28, 2007; Provisional Application No. 60/976,320, filed Sep. 28, 2007; Provisional Application No. 60/976,325, filed Sep. 28, 2007; Provisional Application No. 60/976,327, filed Sep. 28, 2007; and Provisional Application No. 60/976,339, filed Sep. 28, 2007, all of which are incorporated herein by reference.
- Computer networks configured to exchange data according to common protocols, such as the Internet Protocol (“IP”), are increasingly used to perform a variety of tasks between remote systems and users. The connectivity available from computer networks has led organizations and others to seek solutions that facilitate participation in collaborative processes. In this regard, many existing Web sites, network portals, and distributed applications allow users to share data and collaborate in various ways. To further support collaboration, resources are increasingly being made available as a service of the network. Generally described, a service refers to software and hardware that are made accessible from the network separate from any underlying technologies. Accordingly, a network service is frequently described as being “loosely coupled” to the operating system, programming languages, and hardware components on which the service is implemented. As a result, network services may be combined to create distributed applications even though different underlying technologies are utilized.
- The term “cloud” computing is frequently used to describe the trend toward an increasing number of services being made available from the network. As network bandwidth and connectivity increases, the applications and economic incentives of cloud computing will only continue to expand. However, existing systems utilize machine-centric operating systems to manage communications over the network and facilitate collaboration. In this regard, the core design of machine-centric operating systems was established prior to the development of computer networks, such as the Internet. As a result, existing systems are unable to provide a generalized collaboration environment where network communications are readily integrated into applications and other aspects of the user experience. Instead, developing applications that facilitate sharing and participation in collaborative processes remains arduous and ultimately too difficult or expensive for most users and/or organizations. Therefore, a need exists for a network operating system that provides more effective ways of leveraging the connectivity of computer networks.
- Generally described, the present invention is directed to a network operating system that provides more effective ways of leveraging the connectivity of computer networks. In one embodiment, an XML virtual machine is implemented that accepts high-level application code written in an XML programming language as input. Functionality is provided to interpret or translate the application code written in an XML programming language into code that is suitable for execution across computer platforms. Moreover, the XML virtual machine supports the Model View Controller (MVC) design paradigm that facilitates true data abstraction from applications to a common data model. Multi-instance applications, with each instance potentially supporting multiple views, may be created and executed.
- The foregoing aspects and many of the attendant advantages of this invention will become more readily appreciated as the same become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:
-
FIG. 1 is an exemplary pictorial depiction of a networking environment that includes a server-side data center and a plurality of client computers suitable for illustrating aspects of the present invention; -
FIG. 2 is an exemplary pictorial depiction of a networking environment that includes a server-side data center and a plurality of client computers suitable for illustrating aspects of the present invention; -
FIG. 3 is a block diagram depicting an exemplary hardware architecture of a computing device suitable for implementing aspects of the present invention; -
FIGS. 4A-C are block diagrams of exemplary platform environments in which the present invention may be implemented; -
FIGS. 5A-B are exemplary block diagrams of a networking environment that includes a server-side data center and a plurality of client computers suitable for illustrating aspects of the present invention; -
FIGS. 6A-B depict exemplary process and UI XML documents associated with an application suitable to illustrate aspects of the present invention; -
FIGS. 7A-C depict an exemplary graphical display that visually depicts graphical elements of the application described semantically inFIGS. 6A-B ; -
FIGS. 8A-B are pictorial depictions of components suitable to illustrate aspects of the invention; -
FIG. 9 is a block diagram with exemplary managers configured to implement aspects of the present invention; -
FIGS. 10A-C are diagrams illustrating an exemplary application initiation routine that performs processing to open an application package in accordance with one embodiment of the present invention; -
FIG. 11 is an exemplary flow diagram that illustrates a routine for opening and initiating execution of logic defined in an application's process code; -
FIGS. 12A-B depict an exemplary flow diagram that illustrates an execute method configured to cause operations in a process step to be executed; -
FIG. 13 is a diagram of an open handling routine that opens an XML document in accordance with one embodiment of the present invention; -
FIGS. 14A-14B are diagrams depicting the interactions between objects that are suitable for illustrating aspects of the present invention; -
FIGS. 15A-B illustrate an action handling routine that implements functionality in accordance with one embodiment of the present invention; -
FIG. 16 is a diagram of a bind handling routine that binds an object to the data model in accordance with one embodiment of the present invention; -
FIGS. 17A-B are diagrams depicting a trigger activation routine that causes application code to be executed in response to a trigger being activated in accordance with one embodiment of the present invention; -
FIG. 18 is a diagram of a decision handling routine configured to perform an evaluation directing the flow of application execution based on the evaluation; -
FIG. 19 is a diagram of a change handling routine that depicts the logic for implementing a change operation in accordance with one embodiment of the present invention; -
FIGS. 20A-C are diagrams depicting a data update routine that implements logic for modifying the contents of the data model in accordance with one embodiment of the present invention; -
FIG. 21 is a diagram of a set rule routine that depicts the logic for setting a component's rules in the data model in accordance with one embodiment of the present invention; -
FIG. 22 is a diagram of a notify listeners routine that notifies objects of a data update in accordance with one embodiment of the present invention; -
FIG. 23 is a diagram of a rendering routine that causes an application's view to be rendered in accordance with one embodiment of the present invention; -
FIG. 24 illustrates a block diagram suitable for describing the ways in which applications interact with a variety of exemplary data sources in accordance with one embodiment of the present invention; -
FIG. 25 illustrates a block diagram suitable for describing an XML file system provided by the present invention. -
FIG. 26 illustrates a message server configured to enable synchronization of data across the network in accordance with one embodiment of the present invention; -
FIG. 27 illustrates additional aspects of the message server in accordance with another embodiment of the present invention; -
FIGS. 28A-28D illustrate an exemplary method for retrieving a file from a file system provided by the present invention; -
FIG. 28E illustrates an excerpt of an exemplary file that is suitable for illustrating aspects of the present invention; -
FIG. 29 illustrates a method configured to retrieve a list of files in accordance with one embodiment of the present invention; -
FIGS. 30A-30C illustrate a method that creates a file within the XML file system in accordance with another embodiment of the present invention; -
FIGS. 31A-31E illustrate a method that opens an existing file within the XML file system in accordance with another embodiment of the present invention; -
FIGS. 32A-B illustrate logic used to initiate startup of the network operating system on a client computer in accordance with one embodiment of the present invention; -
FIG. 33 illustrates a method for mounting a network operating system group in accordance with another embodiment of the present invention; -
FIG. 34 illustrates a method that transitions a client computer from an online state to an offline state in accordance with one embodiment of the present invention; -
FIG. 35 illustrates a method of transitioning a client computer back to an online state when the client computer has been operating in an offline state in accordance with another embodiment of the present invention; -
FIG. 36 illustrates a method of handling a request to create a new file in a way that facilitates enhanced network communications in accordance with another embodiment of the present invention; -
FIG. 37 illustrates a shared data file utilized with a chat application that is suitable for describing additional aspects of the present invention; -
FIG. 38 illustrates the relationships between components and the data model utilized by a chat application in accordance with another embodiment of the present invention; -
FIG. 39 illustrates the updating of a shared data file used to facilitate a chat conversation in accordance with another embodiment of the present invention; -
FIG. 40 illustrates an exemplary set of communications performed in a chat conversation in accordance with another embodiment of the present invention; -
FIG. 41 illustrates the use of a shared data file in performing collaborative communications between multiple clients; -
FIG. 42 depicts the user interface of an exemplary application suitable for illustrating additional aspects of the present invention; and -
FIG. 43 depicts the user interface of an exemplary application suitable for illustrating additional aspects of the present invention. - Generally described, aspects of the present invention are directed to a network operating system that facilitates the development of Internet-scale cloud computing. In an actual embodiment, the network operating system described herein utilizes the XML (eXtensible Markup Language) as a general-purpose language to represent data. Accordingly, the examples provided below may describe functionality of the network operating system with reference to XML structured data and documents. In this regard, many benefits and synergies are achieved by using XML in this context. However, those skilled in the art and others will recognize that the invention may be implemented using other underlying technologies, or combinations of technologies, than described herein without departing from the scope of the claimed subject matter. Moreover, the illustrative examples and descriptions provided below are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Similarly, any steps described below may be interchangeable with other steps or combinations of steps in order to achieve the same result.
- Referring to
FIG. 1 , the following is intended to provide an overview of anetworking environment 100 that may be used to implement aspects of the present invention. As illustrated inFIG. 1 , thenetworking environment 100 includes the server-side data center 102 that is associated with theservers 104. Thenetworking environment 100 also includes a plurality of client computing devices associated with theuser 112 including themobile phone 106, thedesktop computer 108, and thethin client 110. In this regard, the server-side data center 102 is configured to communicate with themobile phone 106, thedesktop computer 108, and thethin client 110 via thenetwork 114, which may be implemented as a local area network (“LAN”), wireless network, wide area network (“WAN”), such as the Internet, and the like. As known to those skilled in the art and others, the computing devices illustrated inFIG. 1 may be configured to exchange files, commands, and other types of data over thenetwork 114. However, since protocols for network communication, such as TCP/IP, are well known to those skilled in the art, those protocols will not be described here. - In existing systems, application programs that are available on one type of computing device may be incompatible with other types of devices. This incompatibility creates a variety of problems. For example, on a general-purpose desktop computer a user may employ a particular application to access e-mail messages. On the other hand, in order to access e-mail on a limited resource device, such as a mobile phone, another program with different features and interfaces may be required. This incompatibility is not conducive to providing a common user experience and minimizing the amount of knowledge and skill required by users. Moreover, excessive development time is spent creating applications for different types of devices even though many applications implement similar or identical functionality.
- Aspects of the invention may be applied in a number of different contexts of which the following is only an example. In one embodiment, a user's applications and data are accessible from any type of computing device that is enabled for the network operating system. As illustrated in
FIG. 1 , theuser 112 may connect to thenetwork 114 from themobile phone 106,desktop computer 108, orthin client 110. In response, the server-side data center 102 delivers network operating system services to the appropriate device. More specifically, a client-side component of the network operating system and user applications may be delivered and built each time the user connects to the network. Applications execute locally at the appropriate client computing device and not on theservers 104. User data may be cached on a client computing device, but will persist to storage maintained by the server-side data center 102. Accordingly, communications between the client computing devices 106-110 and the server-side data center 102 are principally performed to obtain documents and update data. In instances when a client goes off-line, the client-side component of the network operating system causes data updates to be cached locally. These updates may be transmitted to the server-side data center 102 and synchronized with any other changes when a network connection is re-established. - In one embodiment, the network operating system may provide a common experience across each of a user's computing devices. In this regard, a common desktop application is delivered and built on disparate types of computing devices. From the common desktop, all of a user's application programs and data may be accessed. For example, a single e-mail program enabled for the network operating system may be accessed by the
user 112 from any of the client computing devices 106-110. Since user data is available from the server-side data center 102 and applications are delivered as a service, the same applications (e.g., email program) and data (e.g., e-mail messages) are available regardless of which computing device is being used. - The services provided by the network operating system to a client computing device may be customized depending on user preferences and other variables. In this regard, configuration data is maintained that defines how or whether certain network operating system services will be provided. For example, a user may establish preferences to have different sets of application programs or data available depending on the computing device being used. By way of another example, a user may connect to the
network 114 from any number of access points including an insecure wireless connection. In this instance, security attributes may be established so that certain services and/or data are inaccessible because of the insecure nature of the network connection. As will be appreciated by those skilled in the art and others, the examples provided above represent only some of the ways in which the network operating system services may be customized using the present invention. - For the sake of convenience,
FIG. 1 illustrates the server-side data center 102,server computers 104,mobile phone 106,desktop computer 108, andthin client 110, that are usable in thenetworking environment 100 in which complementary tasks may be performed by remote computing devices linked together through thenetwork 114. However, the invention may be practiced using other types of client computing devices such as, but not limited to laptop computers, tablet computers, personal digital assistants (PDAs), hybrid/embedded devices, set-top boxes, media centers, and the like. Moreover, those skilled in the art and others will recognize that the invention may be implemented in different network configurations and the example depicted inFIG. 1 should be construed as exemplary. - Now with reference to
FIG. 2 , anothernetworking environment 200 that may be used to illustrate additional aspects of invention will be described. As depicted inFIG. 2 , the server-side data center 202 may be coupled to a private network such as theenterprise network 204. In this instance, additional network operating system services are provided to theclients enterprise network 204. However the network operating system is still provided and managed from the server-side data center 216, the enterprise server-side data center 202 is only providing additional services. Moreover, the same additional services may be provided to clients outside theenterprise network 204. In this example, the server-side data center 202 provides network services to theclient 212 over theInternet 214. Similar to the description provided above, the clients 206-212 may be any computing device (mobile phone, desktop computer, thin client, etc.) enabled for the network operating system. In yet another embodiment, the networked operating system may be provided directly by the enterprise server-side data center 202 together with its additional services and may or may not (depending on security configurations) allow access to the external server-side data center 216 outside theenterprise network 204. - The network operating system is configured to facilitate the participation in collaborative processes. One aspect of the present invention is an XML file system that serves as a network repository capable of storing any type of data including XML documents, executables, binaries, multimedia, etc. The XML file system may be implemented at the server-
side data center - A login prompt may be used to obtain user credentials when a client-side component of the network operating system begins executing. To facilitate transparent access, each folder associated with the user may be mapped from the XML file system as a virtual drive on the client. For example, if a user is a member of a particular group, the group folder will appear as a virtual drive on the client. In one embodiment, a folder in the XML file system includes XML structured data that defines the shared resources of a collaboration space. These shared resources may include, but are not limited to, applications, data documents, access and security settings, user lists, statistics, calendar, and the like. The XML file system may also in one embodiment act as a repository and database substitute for one or more applications executing on the networked operating system environment. As described in further detail below, data maintained in the collaborative and distributed database may be automatically synchronized through transaction management provided by the present invention. By building applications utilizing this type of collaborative and distributed database, applications inherit the characteristics of the database and may readily share data.
- Since the XML file system follows an application programming interface (API), other embodiments of the server-
side data center 202 are possible. In the regard, other XML web services may be provided from the XML file system are desirable in cases where abstractions on top of legacy applications and databases within the enterprise is needed to be able to provide a new application or integrate multiple applications executing on the networked operating system environment. The customized implementations of the XML file system may choose the level of functionality to support. For example, the support for synchronizing transactions may be omitted in one level of support. - In addition to managing data access, the XML file system provides an integrated framework for creating and customizing associations between users in a way that facilitates collaboration by synchronizing data and coordinating transactional control of data updates. For example, an application along with any associated user data may be shared by a group of users (e.g., friends). Both the functionality of the shared application and associated user data may be represented in XML documents maintained in the group or user folder, along with other resources. The XML file system provides a way for each user to access the shared application and associated user data. In this way, the shared application may be delivered and built on multiple clients with each group member manipulating data from the same group or user folder.
- As mentioned previously, clients outside the enterprise network 204 (i.e., client 212) may obtain services from the server-
side data center 202. By way of example, an employee or other user may be provided with access to enterprise resources when outside theenterprise network 204. Accordingly, theclient 212 may be a home computer, mobile phone, etc. that accesses the server-side data center 202 over theInternet 214. In this regard, those skilled in the art and others recognize that thenetworking environment 200 may include additional networks than those illustrated inFIG. 2 and the exemplary configuration inFIG. 2 may be reconfigured in many ways to deliver both the network operating system and additional XML file systems in other ways. For example, the network access point for theclient 212 may originate from a local area network, wireless network, wide area network, etc. which may also be true for the server-side data centers - In another embodiment, clients may obtain different types of services from the enterprise server-
side data center 202 depending on one or more variables. Instead of providing the same network services to each client, network services may be configured depending on the location of the client's network access point. For example, clients 206-210 that connect directly to theenterprise network 204 may be provided with additional customized services specific to the enterprise. Outside theenterprise network 204, external services may be delivered to the client 212 (such as a customer, supplier, employee, or other user related to the enterprise) from the server-side data center 202. To facilitate the secure delivery of customized network services, resources may be allocated by the server-side data center 202 for managing different types of clients. In the embodiment depicted inFIG. 2 , the server-side data center 202 includes thehard drive 220 that is allocated to provide customized services to the clients 206-210 inside the network. On the other hand, thehard drive 222 may be allocated to provide the more generalized services to clients outside the enterprise network, such asclient 212. In still other embodiments, the services that are provided to a client may depend on other variables such as the user credentials, settings information, type of client, and the like. - In one aspect, the network operating system provides a more generalized framework for facilitating real-time “business-to-business” collaboration. A collaboration space may be created that allows different enterprises to access resources from a common data store. In the example depicted in
FIG. 2 , theclient 212 may be associated with a partner enterprise to the enterprise that maintains the server-side data center 202. In this regard, the clients illustrated inFIG. 2 may be operated by users or software agents that interact with the server-side data center 202. When operated by software agents, aspects of the invention are effectively creating an EDI (Electronic Data Interchange) relationship in which users associated with the enterprise or individually automatically share resources utilizing the XML file system. EDI services may also be provided by the publicly available server-data center 216, depending on security requirements. A group folder may be created in the XML file system that stores the shared resources of the partnership and/or defines the business rules of the EDI. Similar to the description provided above, the group folder may be mapped as a virtual drive on theclient 212, thereby providing transparent access to shared resources outside theenterprise network 204. Significantly, the shared application may be delivered as XML structured data from the server-side data center 202 to the clients 206-212. Each of the clients 206-212 builds and executes the application locally, reporting data updates back to the shared folder or each users private folders in the XML file system. In one embodiment, the server-side data center 202 is configured to manage data update coordination so that multiple clients may access and update the same documents simultaneously. This coordination may also be performed by the server-side data center 216 if the data is stored in its XML file system. - In one aspect, the network operating system allows the clients 206-212 transparent access to external network services. Using an Application Programming Interface (API), a communicator may be created that abstracts the data handling functions for interacting with any (internal or external) network service. By way of example, developers can create communicators that access network servers hosting XML Web services, REST services, XML resources, RSS or Atom feeds, text, csv text, HTML (Hypertext Markup Language) based Web sites, among others. Referring to
FIG. 2 , an instance of a communicator or “channel” may be instantiated by theclient 212 in order to interact with theWeb service 218. In this example, network operating system services are accessible on a public network (i.e., the Internet 214) to theclient 212 using the server-side data center 216 as a proxy. Moreover, theWeb service 218 is accessible to the clients 206-210 using a communicator even though network operating services are being provided from a private network (e.g., the enterprise network 204). In this instance, the server-side data center 216 serves as the proxy that manages communications between the clients 206-210 and theWeb service 218. Accordingly, clients may use communicators to abstract data handling functions when accessing network services. This aspect of the invention simplifies application development since developers are not required to repetitively write code for managing communications between a client and network service. - While
FIG. 2 illustrates anenterprise network 204, those skilled in the art and others will recognize that this is merely exemplary. Instead, the present invention may facilitate data synchronization and collaboration in other types of network environments. Accordingly, the description provided with reference toFIG. 2 is equally applicable to local area networks maintained by homes and small business as well as wide area networks such as the Internet. Moreover, the examples provided above are made with reference to a server-side data center 202 that provides distinct network services to each client 206-212. However, the server-side data center 202 may be configured to provide network services that complement the resources or services of another device or network. For example, a small business may maintain a network drive for all clients connected to a local area network. The server-side data center 202 may provide data storage services to complement the public network drive at the server-side data center 216 by providing additional storage or allowing backup in the event that a public network device experiences a failure. By way of another example, a home network may utilize a media center computer to provide each local client access to digital media. To complement the storage of the media center computer, a virtual drive may be provided by the server-side data center 202 to all devices connected to the home network. In this regard the virtual drive may be configured to allocate the actual storage of data between the media center computer and the server-side data center 202 based on user preferences or other configuration variables. - Now with reference to
FIG. 3 , an exemplary hardware architecture of acomputing device 300 will be described. WhileFIG. 3 is described with reference to a computing device that is implemented as a client on the network, the description below is applicable to servers and other devices that may be used to implement the present invention. Moreover, those skilled in the art and others will recognize that thecomputing device 300 may be any one of any number of currently available or yet to be developed devices. In its most basic configuration, thecomputing device 300 includes at least one central processing unit (“CPU”) 302 and asystem memory 304 connected by acommunication bus 306. Depending on the exact configuration and type of device, thesystem memory 304 may be volatile or nonvolatile memory, such as read only memory (“ROM”), random access memory (“RAM”), EEPROM, flash memory, or similar memory technology. Those skilled in the art and others will recognize thatsystem memory 304 typically stores data and/or program modules that are immediately accessible to and/or currently being operated on by theCPU 302. In this regard, theCPU 302 serves as the computational center of thecomputing device 300 by supporting the execution of instructions. - As further illustrated in
FIG. 3 , thecomputing device 300 includes anetwork interface 310 comprising one or more components for communicating with other devices over the network. As described in further detail below, the present invention may access basic services that utilize thenetwork interface 310 to perform communications using common network protocols. In the exemplary embodiment depicted inFIG. 3 , thecomputing device 300 also includes astorage medium 308. However, as described in further detail below with reference toFIG. 4A , network operating system services may be accessed using a computing device that does not include means for persisting data to a local storage medium. Therefore, thestorage medium 308 depicted inFIG. 3 is represented with a dashed line to indicate that thestorage medium 308 is optional. In any event, thestorage medium 308 may be volatile or nonvolatile, removable or nonremovable, implemented using any technology capable of storing information such as, but not limited to, a hard drive, solid state drive, CD-ROM, DVD, or other disk storage, magnetic cassettes, magnetic tape, magnetic disk storage, and the like. - As used herein, the term “computer readable media” includes volatile and non-volatile and removable and non-removable media implemented in any method or technology capable of storing information, such as computer-readable instructions, data structures, program modules, or other data. In this regard, the
system memory 304 andstorage medium 308 depicted inFIG. 3 are merely examples of computer readable media. - Suitable implementations of computing devices that include a
CPU 302,system memory 304,communication bus 306,storage medium 308, andnetwork interface 310 are known and commercially available. For ease of illustration and because it is not important for an understanding of the claimed subject matter,FIG. 3 does not show some of the typical components of many computing devices. In this regard, thecomputing device 300 will typically include input devices, such as a keyboard, mouse, microphone, touch input device, etc. Similarly, thecomputing device 300 may also include output devices such as a display, speakers, printer, etc. Since all these devices are well known in the art, they are not described here. - Now with reference to
FIGS. 4A-4C , exemplary platform environments in which the present invention may be implemented will be described. In this regard,FIGS. 4A-4C illustrate the hierarchical relationships between platform layers of the computing device 300 (FIG. 3 ). More specifically, the platform layers of thecomputing device 300 illustrated inFIGS. 4A-B include ahardware platform 402 on the bottom layer, amachine operating system 404 in the middle layer, and anapplication platform 406 on the top layer. Of course, those skilled in the art will appreciate that the platform layers of thecomputing device 300 depicted inFIGS. 4A-4C are merely exemplary. - Since an
exemplary hardware platform 402 of thecomputing device 300 is described above with reference toFIG. 3 , additional description of these components will not be provided here. However, as illustrated inFIGS. 4A-4B , thecomputing device 300 may include amachine operating system 404. In this regard, themachine operating system 404 may be from any of the family of general-purpose operating systems configured to utilize generic hardware such as Microsoft® operating systems, Apple® operating systems, UNIX® operating systems, Linux® operating system, Nokia® Symbian, Google® Android, etc. Also, themachine operating system 404 may be an operating system configured for specialized computing devices that use non-generic hardware such as thin clients, mobile phones, mainframes, supercomputers, and the like. Moreover, themachine operating system 404 may be an operating system designed to satisfy certain configuration parameters such as real-time operating systems, embedded operating systems, etc. - One purpose of machine operating systems is to abstract the details of accessing and otherwise utilizing hardware resources. Accordingly, machine operating systems almost all perform basic system tasks, such as managing I/O (input and output) with hardware components, memory management, task scheduling, etc. In this regard, machine operating systems typically offer services to application programs through an API. Providing services through an API relieves application developers from having to manage the implementation details of accessing or otherwise utilizing an underlying computer platform. Significantly, aspects of the present invention use the
machine operating system 404 only for basic services that are available from all modern computer platforms. In this regard, services may be utilized for interfacing with networking hardware and establishing a network connection to communicate using TCP/IP protocols. - In the embodiment depicted in
FIG. 4A , thecomputing device 300 includes aWeb browser 408 that operates at the top layer of theapplication platform 406. As mentioned previously, a client-side component 410 of the network operating system may be delivered and built on thecomputing device 300. In the embodiment depicted inFIG. 4A , the client-side component 410 is configured to operate within the context of theWeb browser 408. In this regard, theWeb browser 408 may be any number of browser applications configured to communicate with remote devices using TCP/IP network communication protocols including, but not limited to, Mozilla Firefox®, Microsoft's Internet Explorer®, and the like. - In the embodiment depicted in
FIG. 4A , the client-side component 410 does not directly interact with themachine operating system 404. Instead, basic services used by the client-side component 410 are accessed from theWeb browser 408. Those skilled in the art and others will recognize that HTTP is a higher-level protocol than TCP/IP that, among other things, allows network resources to be requested/received using a Uniform Resource Locator (“URL”). Typically, Web browsers generate HTTP requests in order to obtain Web pages formatted in a markup language such as the Hypertext Markup Language (HTML), eXtensible Markup Language (XML) or formatted using JSON (“Java Script Object Notation”) and/or JavaScript. In one embodiment, theWeb browser 408 is used by the client-side component 410 of the network operating system to perform network communications using HTTP and for rendering graphical elements that are represented in HTML among other graphical representation technologies available from Web browsers. - In the embodiment depicted in
FIG. 4B , the client-side component 410 of the network operating system directly accesses the services of themachine operating system 404 without using a Web browser. Aspects of the present invention allow applications to be delivered and built on disparate types of computing devices. However, Web browsers are typically configured to display graphical elements according to a pre-determined page size and/or layout. Thus, a general-purpose Web browser may not be well-suited for rendering graphical elements on every type of computing device in which the present invention may be implemented. For example, using a Web browser to render graphical elements on a small form factor computing device may be problematic. In this regard, the pre-determined page size and/or layout anticipated by the Web browser may be too large or otherwise inappropriate given the available form factor. As illustrated inFIG. 4B , the client-side component 410 of the network operating system may be implemented as a stand-alone application, or even as a machine operating system. In this instance, the client-side component 410 is configured to perform graphical rendering in a way that is appropriate given the form factor of thecomputing device 300 without using a Web browser. Moreover, in this embodiment, basic services for performing network communications are obtained directly from themachine operating system 404 or built into the client-side component 410. - In the embodiment depicted in
FIG. 4C , thecomputing device 300 does not include a traditional machine operating system. Instead, basic services for interacting with thehardware platform 402 are built into the client-side component 410. In this embodiment, the client-side component 410 implements basic system tasks for performing memory management, task scheduling, and the like. By building these types of basic machine services into the client-side component 410, aspects of the present invention may be readily customized and deployed for use with particular hardware platforms. In other words, the client-side component 410 may be configured to be independent from the services offered by providers of machine operating systems. - As mentioned above, the client-
side component 410 may be delivered as a network service and built each time a user connects to the network. As illustrated inFIGS. 4A-4C , the client-side component 410 is suitable for being implemented as a stand-alone application, a machine operating system, or within the context of a Web browser. In all of these embodiments, the server-side data center side component 410 as a service of the network. Accordingly, a limited resource computing device that does not have a storage medium (e.g., hard drive, CD-ROM, DVD, etc.) may be used to access network operating system services provided by the present invention. In this regard, the client-side component 410 and other network operating system data may be cached in system memory (ROM, RAM, etc.) without persisting to a local storage medium. As such, applications enabled for the network operating system do not need to be “installed” on thecomputing device 300 as applications may be delivered as a service. - Now with reference to
FIGS. 5A-5B , a description of how a common data model may be used to deliver network operating system services in accordance with the present invention is provided. The network operating system supports the Model View Controller (MVC) design paradigm by separating application components into different layers, namely, a model, view, and controller. In an actual embodiment, XML documents are the “model” or common data format in which information is represented in the network operating system environment. Utilizing a common data model (e.g., the XML document) in this context results in many benefits, as will be clear in the description that follows. - The
networking environment 500 depicted inFIGS. 5A-5B includes the server-side data center 502 that is communicatively connected to each of theclients network 508. As described above, the client-side component of the network operating system may be dynamically delivered to each of theclients side data center 502 or be locally installed on either of theclients virtual machine 510 that interprets or causes XML structured applications to be executed on theclients side data center 502. In this regard, the process XML document provides the logic that describes a startup-sequence for theclients virtual machine 510. The startup-sequence typically instantiates and manipulates a set of objects within the XMLvirtual machine 510 so that other applications may be executed. - As mentioned above, XML may serve as the “model” or common format in which application logic and other data is represented in the network operating system environment, but other models, data formats, and structuring of data may also be utilized to implement the invention. In one embodiment, XML programming languages that allow applications to be designed at a very high level of abstraction are provided. Those skilled in the art and others will recognize that XML is a highly structured, transferable, and transformable language. As such, representing application logic at a high abstraction level as XML structured data is memory efficient and results in compact applications. Specifically, a platform is provided for executing an application's logic represented in one or more well-formed XML documents. Application functionality is separated according to the MVC design paradigm thereby eliminating repetitive tasks performed by traditional systems. Accordingly, transmission of application code from the server-
side data center 502 to theclients virtual machine 510. Interactions that would have otherwise been handled by performing a server “round-trip” is handled directly on theclients side data center 502. - One aspect of the present invention is an XML
virtual machine 510 that provides theclients 504 and 506 a platform and application programming interface (API) for executing and developing applications. In this regard, high-level application code written in an XML programming language is accepted as input and executed locally on theclients virtual machine 510. Functionality is provided to interpret or translate the high-level application code into interpretable code, byte code, or other lower-level language that is suitable for execution on any platform. In this regard, the XMLvirtual machine 510 abstracts the underlying computer platform and network resources so that applications may be executed in the same way on any type of computing device. Accordingly, the XMLvirtual machine 510 is completely platform and hardware independent and can be implemented using any number of currently available, or yet to be developed, programming technologies, such as, but not limited to, Microsoft .NET®, Java, C, C++, HTML, JavaScript, AJAX, Adobe® Flash, Microsoft® SilverLight, and the like. - Now with reference to
FIG. 5B , additional aspects of how the common data model is used to provide network operating system services will be described. Thenetworking environment 500 illustrated inFIG. 5B includes the same components described above with reference toFIG. 5A . In addition, anXML file system 512 that provides storage and other network services is depicted on the server-side data center 502. Accordingly, data maintained in theXML file system 512 may be accessed by theclients side cache 514 for managing the storage of documents and other run-time data on theclients FIG. 5B , data stored in the client-side cache 514 is readily accessible to the XMLvirtual machine 510. In one embodiment, the client-side cache 514 enables the XMLvirtual machine 510 to continue executing applications even if the network connection is temporarily unavailable or if aclient clients clients XML file system 512 residing on the server-side data center 512 when the network connection is re-established. - As mentioned previously, the present invention provides programming languages that allow developers to create applications at a very high level of abstraction. In an actual embodiment, these programming languages include a process XML language, a user interface (“UI”) XML language, and an application package XML language. Application code written in these programming languages is suitable to be represented as XML structured data and stored in XML documents. In the example illustrated in
FIG. 5B , theprocess XML document 516, userinterface XML document 518, and applicationpackage XML document 520 contain application code written in these programming languages, respectively. Accordingly, an application may be defined in one or more XML documents maintained at the server-side data center 502. Moreover, an application will typically utilize data documents such as thedata XML document 522 also maintained at the server-side data center 502. These XML documents 516-522 may be accessed by theclients virtual machine 510. - In one embodiment, the UI XML language is used to define an application's “view” in the MVC design paradigm. In this regard, markup languages were originally developed to describe the layout of Web pages in a way that allowed the pages to be rendered by a Web browser. The structured nature of markup languages allowed the appearance of Web pages to be modified without affecting the implementation of the Web browser or other related technologies. In this regard, the UI XML language defines the appearance and behavior of an application user interface in accordance with a schema that complies with XML syntax. Using the UI XML language, developers may create applications with the same graphical elements (i.e., menus, toolbars, drop-down boxes, and the like) that exist in common desktop applications. Since the user interface logic does not depend or describe its implementation in a way that is specific to a particular client, the UI XML language is suitable for developing user interfaces that work across different platforms. Moreover, user interfaces and behavior described in the UI XML language describe these elements in accordance with the XML syntax at a higher-level of abstraction in accordance with the MVC design paradigm. Accordingly, user interfaces and behavior described in the UI XML language may be readily transformed or otherwise modified without impacting other systems. This ability to transform the UI XML language allows an application's functionality to be customized based on one or more variables. For example, a transform may be defined to reduce or eliminate certain aspects of application functionality depending on the type of device being utilized. By way of another example, a transform may be defined on the UI XML language to remove or restrict certain functionality depending on user access credentials or for localizing applications for different languages and/or markets.
- In one embodiment, the process XML language is used to define the “controller” component of an application in the MVC design paradigm. In this regard, the process XML language allows developers to describe the logic of an application in a set of process steps. Each process step contains one or more operations that are approximately equivalent to instructions and/or method calls in a traditional programming languages. In the MVC design paradigm, the process XML language is used as the controller or glue between the user interface (“View”) logic and the XML data (“Model”). Accordingly, aspects of the invention enable application logic to be described using the process XML language at a higher abstraction level than traditional programming languages. In this regard, the user interface logic (“View”) is completely separated from the process XML logic (“Controller”). As a result, the data handling functions that comprise the majority of application code in existing systems is automatically handled by the present invention. Specifically, using the process XML language, intelligent data bindings may be defined between the view logic and the data model. When executing applications, the I/O (input and output) or data, both to the data model cached locally and to the remote file system and any remote listeners is automatically handled by the network operating system. Since developers do not provide data handling logic, the applications created using the process XML language are frequently developed more quickly and include less application code than traditional applications. As described in further detail below, the process XML language provides other advantages for creating and distributing applications in a networking environment, than described with reference to
FIG. 5A . - In addition to the languages described above, an application package XML language is also provided. The application package XML language allows developers to describe the resources utilized by an application. In this regard, the UI and process XML documents that define an application's functionality may be identified in an application package. Logic in the application package allows developers to package and distribute an application's resources to clients in a controlled and secure manner. Moreover, the use of an application package allows multiple instances of the application to be created in a way that enables the XML
virtual machine 510 to ensure intra-application security. - In one aspect, the present invention provides improved methods for distributing applications and software updates in a networking environment. Using existing systems, an application is typically distributed in an executable format that, when executed, “installs” the application on a computing device. An executable typically represents application logic as machine instructions that are specific to a particular computing platform. As such, an executable is a memory-intensive representation of an application that consumes a relatively large amount of bandwidth when distributed in a networking environment. Accordingly, complex and resource-intensive systems are required to distribute and install applications using executables.
- Improved methods for distributing applications and software updates over the network are integrated into the network operating system. An application enabled for the network operating system is not “installed” on a client computing device using an executable. Instead, the present invention allows application logic to be represented entirely in XML structured data. When a client establishes a network connection, an application as represented in one or more XML documents, may be obtained automatically from a service provider, which may provide the XML documents from a local/private server or any Web server on the Internet. Accordingly, an integrated framework is provided for distributing applications to clients over the network. In addition, updates such as “patches” and more recent versions of an application may also propagate automatically to clients. In this regard, since application logic is represented in XML documents that are distributed automatically as a network service, any modifications to the XML documents will also propagate to clients as a network service. In the network operating system environment application logic may be synchronized across the network the same was as any other data. Since the XML
virtual machine 510 andXML file system 512 are configured to synchronize data and coordinate changes through transaction handling, changes to applications may be performed in real-time and in a collaborative manner. For example, an application maintained in a shared folder may be opened and executed on theclient 504. Concurrently, a user associated with theclient 506 could modify the application logic and have the changes automatically propagated to theclient 504. The changes to application logic would be implemented in real-time and therefore be readily observed on theclient 504 as the changes occur. - As described above with reference to
FIGS. 5A-5B , an XML representation of an application is distributed by a service provider and executed on the client using the XML virtual machine. As a result, clients may continue to execute applications “off-line” without requiring runtime processing from the server-side. In this instance, XML documents representing one or more applications are cached in memory on the client. The XML virtual machine may access these cached XML documents to continue executing applications without having a network connection. Moreover, data updates that occur off-line are also cached and transmitted to the server-side when a network connection is re-established. - Significantly, the present invention provides network operating system services without requiring virtualization of computer resources. In this regard, a number of technologies for virtualizing computer resources are being used to provide network services, such as “cloud” storage. Generally described, these virtualization technologies abstract computer resources that are typically associated with a server away from underlying platforms. The abstracted resources are typically encapsulated in a platform independent interface suitable to be accessed from the network. In this regard, the computer resources that may be abstracted include applications, hardware, desktops, machine operating systems, and the like. However, complex systems are required to abstract and encapsulate computer resources in this way. For example, a virtualization layer that simulates a servers underlying hardware and has at least some impact on performance may be required. Moreover, these virtualization technologies promote a server-centric model that shifts the location where resources are implemented and executed to the server-side. The increased processing and other demands placed on servers may not scale when network services are provided to an ever-increasing number of users. Accordingly, using virtualization technologies to implement a network service may require a consolidated data center in which an oversupply of servers are needed to ensure that the service is available on demand. Moreover, virtualization technologies consume more bandwidth and result in a slower user experience since application logic is executed on a remote server and not directly on the client. This will also result in applications being unavailable when the network connection goes down or the client goes “off-line.”
- Implementing a network service without virtualizing computer resources provides numerous advantages. In this regard, a more-scalable architecture is provided that allows network services to be accessed by an ever-increasing number of users. By using the XML virtual machine to execute applications on the client-side, processing and other resources from clients are more fully utilized. This implementation provides a more-scalable architecture because a natural correspondence exists between the number of users accessing a network service, bandwidth usage, processing power, and other resources that are available from the client-side to execute application logic. In addition to being more-scalable, executing applications on the client using the XML virtual machine allows application functionality to be readily accessed by users while “off-line.” When the client goes “off-line,” applications and user data represented in one or more XML documents may be stored in a client-side cache. Accordingly, all of an application's logic is available and may be executed using data in the cache, regardless of whether an active network connection exists. However, an application may not access network resources while “off-line” and may need to reestablish a network connection to implement all of the application's functionality. In contrast, the “off-line” functionality provided when a network service is implemented using virtualization technologies is more limited. In this regard, some existing network services implement an “off-line” mode where users may continue to interact with an application used to access a network service. However, to provide this functionality, an executable or other lower-level representation of an application is distributed and installed on the client. When the user is “off-line,” this lower-level representation of the application is executed locally. However, installing applications on the client to provide this “off-line” functionality may not be feasible or convenient. For example, a limited resource computing device may not have sufficient storage to “install” an executable or other lower-level representation of an application. More generally, the functionality available on a client without an active network connection is limited to those applications that have been installed locally. However, a client may not have sufficient computing resources (storage, memory, bandwidth, etc.) to install each desired application using an executable or other low-level representation of the application.
- In one aspect, the present invention implements improved methods for accessing network services over mobile, wireless, or unstable networks. Those skilled in the art will recognize that mobile or wireless networks are less reliable and bandwidth-constrained when compared to wired networks. Providing programming languages that represent application logic as XML structured data and an XML
virtual machine 510 configured to automatically perform repetitive data handling functions results in highly compact and memory efficient applications. In this regard, applications are able to share the functionality of the XMLvirtual machine 510 and reuse objects when implementing application logic. As a result, distributing applications enabled for the network operating system consumes a fraction of the bandwidth when compared to existing application distribution systems. Moreover, the present invention allows XML representations of applications to be maintained in a client-side cache and executed locally using the XMLvirtual machine 510. Since application logic and data may be cached locally, a continuous network connection may not be necessary. Instead, the present invention is well-suited to providing access to network services over wireless networks in which network connectivity may be intermittent. Moreover, since applications are executed locally, more reliable network services with a certain guarantee of service may be provided. For example, the present invention is also well-suited for providing enterprise class applications as a service of the network such as the Internet. In this regard, those skilled in the art and others will recognize that enterprise class applications may need to be accessible within the enterprise even if the network connection is temporarily unavailable or the quality of the Internet connection affects access to the network. The invention described herein solves this problem. - Client-Side Component of the Network Operating System
- Those skilled in the art and others will recognize that XML is an extensible language that provides a foundation for the creation of additional languages. An XML document has a hierarchical tree structure, where the root of the tree identifies the document and other nodes in the document are descendents of the root. Nodes of the tree may contain document content, as well as data that defines the structure of the content. In addition to the syntax imposed by XML, elements and their associated attributes may be defined to establish other semantic constraints on the structure and content of an XML document. In one embodiment, the present invention implements schemas or vocabularies that apply additional semantic constraints over those imposed by XML. Using the XML languages provided by the present invention, developers represent an application's logic semantically in accordance with the MVC design paradigm.
- The MVC design paradigm was originally implemented in the Smalltalk programming language and has since been used in other engineering contexts. Those skilled in the art and others will recognize that the MVC design paradigm is merely descriptive of a general architectural paradigm for separating functionality into layers. As such, the MVC design paradigm is implemented in various contexts to eliminate dependencies and support platform independence. By way of example, existing systems used to store HTML data, gather dynamic Web page content, and render a Web page are frequently described as adhering to the MVC design paradigm. Moreover, development environments used to create Web applications may separate functionality into layers according to the MVC design paradigm. In this context, the graphical user interface of the Web application is separated from a data model to support more modular application development. However, these existing systems implement functionality and utilize an underlying data model that is more domain-specific than the present invention.
- Unlike existing systems, aspects of the present invention allow any type of application to be created in accordance with the MVC design paradigm. In other words, separation of the user interface from logic and the underlying data model is not limited to Web applications, Web pages, and the like. Multi-instance applications, with each instance potentially supporting multiple views, may be created and executed in the network operating system environment. Moreover, these application instances each manipulate data from a common data model. Since developers do not have to provide program logic for setting and accessing data from the data model and managing synchronization and data exchange between the user interface (“View”) and data model, application development is greatly simplified.
- Now with reference to
FIGS. 6A-B , exemplary process and UI XML documents that may be used to illustrate aspects of the present invention will be described.FIG. 6A depicts an exemplary process XML document 600 (“MyTasks.xml”) that provides a semantic description of the controller logic for a “MyTasks” application. As illustrated inFIG. 6A , theMyTasks.xml document 600 includes atrigger 602 defined in the “<trigger>” XML element. Thistrigger 602 maintains a set of attributes including the view, component, event, and step attributes. Moreover, application logic written in the process XML language may define a sequence of process steps. In this example, theMyTasks.xml document 600 includes a plurality of process steps 604-610 delineated by the “<step>” XML elements. As depicted inFIG. 6A , two attributes are associated with each of the process steps 604-610 including a number attribute (“id”) and a name attribute. Within each process step, at least one operation is defined. By way of example, theprocess step 604 associated with the name attribute “Initialize Application” includes three operations 612-616 that are delineated by the “<operation>” XML elements. -
FIG. 6B depicts an excerpt from a UI XML document (“MyTasks_gui.xml”) that provides a semantic description of exemplary “view” logic for the MyTasks application. As illustrated inFIG. 6B , theMyTasks_gui.xml document 650 includes twobutton components MyTasks_gui.xml document 650 includes twoinput components input components - Upon launching an application, aspects of the invention that serve as the XML virtual machine may begin interpreting the
MyTasks.xml document 600. In one embodiment, application logic is interpreted one statement at a time, rather than being compiled in its entirety before execution. However, application code written in the XML languages provided by the present invention may be compiled into executable code or byte code in alternative embodiments. In this example, theMyTasks.xml document 600 defines atrigger 602 that identifies aprocess step 606 in the application that will be executed in response to activation of the trigger. Initially, when the XML virtual machine begins interpreting theMyTasks.xml document 600 in an illustrative embodiment, thetrigger 602 is registered so that flow may be directed to theappropriate process step 606 in response to the activation of the trigger. - In the
MyTasks.xml document 600 depicted inFIG. 6A , the application defines adefault process step 604 with the name attribute “Initialize Application” where flow of control is directed once any triggers in the application have been registered. Theoperation 612 with the name attribute “open” and the value attribute “apps/mytasks_gui.xml” is the first operation in the InitializeApplication process step 604 that will be executed. Execution of theOpen operation 612 will cause the view of the application as represented in theMyTasks_gui.xml document 650 to be interpreted and rendered on a computer display. In this example, the application's view includes the components 652-658 defined semantically in theMyTasks_gui.xml document 650. Once theMyTasks_gui.xml document 650 has been opened, execution will proceed to theoperation 614 with the name attribute “action” and the value attribute “#MyTasks.” Generally described, execution of theAction operation 614 will cause thebutton component 654 to be hidden from view once theMyTasks_gui.xml document 650 has been opened. - With reference now to
FIGS. 7A-C , an exemplarygraphical display 700 associated with the MyTasks application will be described. Specifically, thegraphical display 700 depicted inFIG. 7A includes theButton1 component 702 and theButton2 component 704 that correspond to the button components 652-654 described semantically in theMyTasks_gui.xml document 650. Moreover, thegraphical display 700 includes theInput3 component 706 andInput4 component 708 that correspond to the semantic description of the input components 656-658, respectively. In this regard, thegraphical display 700 inFIG. 7A represents a visual depiction of theMyTasks_gui.xml document 650. As mentioned above, the process logic in theMyTasks.xml document 600 causes theButton2 component 704 to be hidden when the MyTasks application is launched. Accordingly, theButton2 component 704 is depicted inFIG. 7A with a dashed line to indicate that theButton2 component 704 is not initially visible to the user subsequent to execution of theAction operation 614. - Generally described, the exemplary MyTasks application is configured to display a list of task descriptions that are stored in a “data/tasks.xml” document. More specifically, task descriptions will be displayed in the
Input3 component 706 by default when the application is launched. In one aspect, a user may modify the task list by directly interacting with theInput3 component 706 and changing entries of task descriptions. In another aspect, the user may input a new task description into theInput4 component 708 and activate thetrigger 602 by selecting theButton1 component 702. If valid input is received, the new task description is added to the “data/tasks.xml” document and automatically displayed by theInput3 component 706. Conversely, if the user merely selects theButton1 component 702 without providing any input into theInput4 component 708, theButton2 component 704 is displayed with text requesting that the user provide a valid task description. - With reference again to
FIG. 6A , theoperation 616 with the name attribute “bind” and the value attribute “data/tasks.xml” is the next operation in the InitializeApplication process step 604 that will be executed. Generally described, execution of theBind operation 616 will cause theInput3 component 706 to become a data binding component that displays a list of task descriptions. Specifically, the logic provided in theBind operation 616 and its associated component element 618, binds theInput3 component 706 to a list of task descriptions represented in the “data/tasks.xml” document. In this example, a task is defined within the “data/tasks.xml” document as an element that maintains an associated description attribute. The logic provided by the component element 618 selects the “/tasks/task/@description” attribute of the task element for display in theInput3 component 706. As depicted inFIG. 6A , theBind operation 616 is the last operation in the InitializeApplication process step 604 that is executed. - With reference now to
FIG. 7B , the state of thegraphical display 700 subsequent to execution of theBind operation 616 will be described. In this regard,FIG. 7B depicts the same button and input components 702-708 described above with reference toFIG. 7A . However, after execution of theBind operation 616, a set of task descriptions is displayed by theInput3 component 706. Specifically, theInput3 component 706 is bound to description attributes of task elements defined in the “data/tasks.xml” document. Accordingly, after theBind operation 616 is executed, the values assigned to these task descriptions, as represented in the data model (e.g., document object 710), are displayed in theInput3 component 706. - Upon execution of the Initialize
Application process step 604, execution of application logic represented in theMyTasks.xml document 600 does not resume until the activation of a trigger. In this example, the MyTasks application defines atrigger 602 that directs the flow of execution to process step “2” when theButton1 component 702 experiences a “select” event. Accordingly, thetrigger 602 directs the flow of execution to theprocess step 606 entitled “Press Button” in response to theButton1 component 702 being selected. In this example, theoperation 620 with the name attribute “decision” and the value attribute “#MyTasks#input4” is the operation in the PressButton process step 606 that will be executed. Generally described, thedecision operation 620 performs a test to determine whether any text was entered into theInput4 component 708 when theButton1 component 702 was selected. The logic within the “<when>”XML element 622 directs the flow of execution to processstep 608 if text was entered into theInput4 component 708 when theButton1 component 702 was selected. Conversely, thedecision operation 620 causes the flow of execution to proceed to processstep 610 if text was not entered in theInput4 component 708 upon the occurrence of the trigger. - In the example when text is entered into
Input4 component 708, the flow of execution proceeds to the “Add Task”process step 608. Accordingly, the operation 624 with the name attribute “change” and the value attribute “data/tasks.xml” is the next operation that would be executed. The change operation 624 will cause a new task element with the appropriate description attribute to be added to the “data/tasks.xml” document. In this regard, the “<store>”XML element 626 within the change operation 624 provides logic that causes the text entered in theInput4 component 708 to be stored in the description attribute of the new task. - With reference now to
FIG. 7C , the state of thegraphical display 700 subsequent to the entry of a new task and the selection of theButton1 component 702 is depicted. Accordingly,FIG. 7C includes the same components 702-708 as described above with reference toFIGS. 7A-B . In this example, the user entered the text “purchase airline tickets” into the text area provided by theInput4 component 708. The change operation 624 described above would add the value of this task description to the “data/tasks.xml” document utilizing thecorresponding document object 710. Since theInput3 component 706 is bound to a selection of description attributes affected by the change operation 624, the list of tasks displayed by theInput3 component 706 is updated automatically in thedocument object 710. In other words, developers do not have to provide application code for handling the synchronization and exchange of data between theInput3 component 706 and the data model. - In one aspect, the user may input a new task description into the
Input4 component 708 and update the task list by selecting theButton1 component 702. Moreover, a user may modify the task descriptions by directly interacting with entries that are displayed in theInput3 component 706. By way of example, the user may delete the “update presentation” task description currently being displayed by theInput3 component 706. Since a data binding is defined, the deletion would automatically propagate to the “data/tasks.xml” document. In this regard, one or more components and/or local or remote applications may be data listeners to the task descriptions represented in the “data/tasks.xml” document. Each of the local data listeners would be notified and updated by thedocument object 710 in response to the “update presentation” task being deleted. Significantly, the deletion of the task would propagate to the underlying data model and then to any data listeners over the network without a developer being required to provide application code for handling the data update. - With reference again to
FIG. 6A , if text is not entered intoInput4 component 708 when theButton1 component 702 is selected, the flow of execution proceeds to the “Show Button”process step 610. Accordingly, theoperation 628 with the name attribute “action” and the value attribute “#MyTasks” is the next operation that would be executed. Generally described, execution of thisAction operation 628 will cause theButton2 component 704 that was initially hidden (FIG. 7A ) to be displayed. As represented in theMyTasks_gui.xml document 650, theButton2 component 704 would display a text string requesting that the user provide a valid task description. - As will be appreciated by those skilled in the art and others, the MyTasks application described with reference to
FIGS. 6A-7C is a highly simplified example of one application that may be used illustrate aspects of the present invention. Additional applications may be created and executed in the network operating system environment. Accordingly, the examples and description made with reference to the MyTasks application herein should be construed as exemplary. - Programming languages used to develop modern applications (C++, Java™, Python™, etc.) have user interface components created and maintained in the process logic of the application. In other words, a developer explicitly provides the logic to create and set data on user interface components. Moreover, developers provide code in the application's process logic to listen for events and otherwise monitor data changes that affect the application's user interface. These event listeners cause data changes to be persisted between the user interface of an application and a domain-specific data structure. However, the input/output between an application's user interface to the data structure is not standardized. Accordingly, presentation of data on the application's user interface is tightly coupled to how the data is represented in the data structure. As a result, modifications to the user interface or the data structure may affect other aspects of the application.
- The network operating system provides an automated communication path between the user interface and an underlying data model to support execution of applications that adhere to the MVC design paradigm. In this regard, developers may define a binding between a user interface component (sometimes referred to as a control or widget in other programming environment languages) and the underlying data model. Data updates to the underlying data model and coordination of data changes that affect components are managed by the present invention, thereby simplifying application development. As the description of the MyTasks application illustrates, if data represented in an underlying data document changes, any data bound components listening for changes are automatically updated. More specifically, the
bind operation 616 in the MyTasks application provides the application logic for binding theInput3 component 706 to a set of data represented in the data model. Accordingly, the deletion of the “update presentation” task from the underlying data XML document is automatically propagated to listening components, including applications and components that are listening to the same document over the network. Moreover, data bindings facilitate exchange and synchronization of data between user interface components both locally and among remote clients over the network. By way of example, the change operation 624 in the MyTasks application provides the application logic that updates the underlying data document with text entered into theInput4 component 708. In this regard, theInput3 component 706 is listening for changes to the underlying data document. The visual display of theInput3 component 706 is updated when text is entered into theInput4 component 708 and thetrigger 602 is activated. In this example, the combination of data binding and the change operation 624 enables the synchronized exchange of data between user interface components. - As described above, a binding provides an automated communication path between a user interface component and the underlying data model. In one aspect, the present invention allows binding to be shared and/or transferred between user interface components. This aspect of the present invention is represented in
FIGS. 8A-B , which depictcomponents FIG. 8A depicts acomponent 800 that is configured to display the user's folders in a tree structure. If the user generates input requesting that the folders be displayed as a list, the data binding of thecomponent 800 to the underlying data may be transferred to thecomponent 850, which will also transfer the state of thecomponent 800. This example illustrates that the present invention eliminates dependencies between the representation and processing of data from the configuration of the data model. Moreover, the transfer and sharing of data bindings not only provides an automated communication path between application layers in accordance with the MVC design paradigm, but also provides an enhanced platform for developing applications. - The present invention provides a set of user interface components (i.e., buttons, input boxes, drop-down boxes, display panels, and the like). To facilitate application development, a standard framework allows applications to be built from related user interface components. In this regard, user interface components may inherit properties from a parent component utilizing the UI XML language and therefore be combined to express more complex user interface elements. As a result, an application may include a set of related components organized in a hierarchical structure in which each component is aware of a related component. Alternatively, a single user interface component may be defined that represents the entire view of an application. In addition, a component API (Application Programming Interface) is provided that allows developers to create new user interface components for use with the present invention.
- In one aspect, the present invention supports the development of process-oriented applications using the process XML language. In this regard, each process step in the
MyTasks.xml document 600 represents part of the process execution flow. Operations within a process step may define a state change in the application being executed. Communications between processes are supported through the controlled access to data that describes the runtime state of an application and through the utilization of messaging ports. Developers may reference views, components, and other runtime variables with expressions that utilize globally-named objects. In this regard, an expression language or common way of referencing and manipulating objects is provided. Generally described, the expression and process XML languages collectively abstract the complexities of executing multi-instance applications. Instead, developers may create an application as though the application would only exist in a single instance of execution. As theMyTasks.xml document 600 illustrates (FIG. 6A ), expressions are structured to be compatible with XML syntax and may be delimited or tagged for use within other programming languages. When an expression is evaluated, the XML virtual machine performs the work of identifying, merging, and otherwise manipulating the requested data in accordance with the received expression. As a result, globally-named objects may be utilized by developers in application code even though multiple runtime instances of the application are being executed. - The present invention provides a client-side component that is implemented in a plurality of “classes” from which “objects” may be instantiated. In other words, the client-side component may be implemented using a programming language such as JavaScript that utilizes object-oriented programming features. Alternatively, the invention may be implemented using non-object oriented languages such as the C programming language or any other language in which structures may be represented as objects. As will be understood by those skilled in the art, objects created from a class typically include methods that encapsulate or hide the algorithms that implement the object's functionality. Instead of exposing these implementation details, objects provide interfaces by which other modules may access their functionality as an abstraction. Accordingly, functionality that implements the XML virtual machine in accordance with one embodiment of the present invention occurs in the context of objects that utilize object-orientation and inheritance.
- As mentioned previously, the client-side component serves as an XML virtual machine that executes applications written in languages that adhere to the XML syntax. In an actual embodiment, the XML virtual machine is configured to execute application code described semantically in a process modeling language (e.g., the process XML language), user interface modeling language (e.g., the UI XML language) and an application package modeling language (e.g., the application package XML language). Significantly, the XML virtual machine may be extended to understand additional XML languages or XML-based applications to provide functionality not described herein. Moreover, it should be well understood that instead of executing programming logic using the XML languages described herein, other embodiments are possible. For example, a JavaScript API or libraries could be used to build applications implement the same functionality. Accordingly, the utilization of XML-based languages is merely exemplary and the present invention could be implemented using traditional programming languages.
- At any given time, an application being interpreted by the XML virtual machine may be understood as being in a particular state of execution. The process XML language allows developers to define the conditions for transitioning between states. Among other things, the XML virtual machine implements functionality for managing the state transitions by (1) defining a set of runtime variables/objects that describe the state of an executing application; (2) implementing logic that drives when a transition in the application state will occur, and (3) providing low-level constructs that implement the appropriate change in the application state.
- Now with reference to
FIG. 9 , aspects of the client-side component and the classes and objects that implement the XML virtual machine will be described. The client-side component includes a plurality of “managers” or objects that will typically be instantiated at start-up of the client-side component of the network operating system and remain active throughout a user session. As mentioned previously, objects provided by the client-side component in accordance with an illustrative embodiment utilize object orientation and inheritance. In this regard, asystem context object 902 may be instantiated that serves as a placeholder where managers and other objects are embedded at runtime. Accordingly, thesystem context object 902 may be used to instantiate the managers depicted inFIG. 9 including theapplication manager 904,process manager 906,view manager 908,transaction manager 910,document manager 912, andevent manager 914. - Each manager typically performs a specific task that is exposed through the interface accessible from the
system context object 902. Accordingly, other objects implemented by the present invention may call and utilize a manager's functionality to perform the desired task. For example, theprocess manager 906 may be called to instantiate a process object in preparation of executing an application's process code. In another aspect, managers allow the controlled instantiation and communication between objects that provides the foundation for intra-application and intra-process security. While the description herein may be provided with reference to particular managers and the associated objects that a manager holds, those skilled in the art and others will recognize that the encapsulation of functionality into a particular type of manager is exemplary. In other embodiments, the functionality described herein with relation to particular managers and their corresponding objects may be performed without being encapsulated or may be encapsulated in a different way than described. Moreover, object-oriented programming languages and features described herein are merely illustrative, as other tools may be utilized without departing from the scope of the claimed subject matter. - As depicted in
FIG. 9 , the client-side component includes anapplication manager 904 that provides logic for managing the lifecycle of an application. In this regard, functions are exposed by theapplication manager 904 for creating, opening, and terminating applications. An application may be represented internally as an application object that “registers” with theapplication manager 904. When an application is scheduled for execution, theapplication manager 904 may be called to create a corresponding application object. Accordingly, theapplication manager 904 creates and holds references to all active applications in the system. - As mentioned previously, attributes of one or more applications may be described semantically by developers in an application package using the application package XML language. The attributes described in the application package include references to resources and system settings that are utilized by a particular application to execute. Resources identified in the application package will typically include the XML documents that provide the semantic description of an application's view and process logic. In one aspect, the
application manager 904 is configured to extract information from the appropriate application package and obtain the identified resources when an application is scheduled to execute. Alternatively, any XML data resource, including UI and process XML documents, may be directly embedded into an application package. In another aspect, functionality that allows applications to continue executing when the client goes “off-line” is implemented by theapplication manager 904. In this regard, the appropriate application package may be referenced by theapplication manager 904 to identify the resources utilized by a corresponding application. Then, any resources that have not yet been cached locally are identified and obtained from the appropriate service provider. - The
process manager 906 depicted inFIG. 9 is responsible for creating and holding internal process objects that are used to execute process steps in an application. As mentioned above, application logic written in the process XML language may define a sequence of process steps that each include one or more operations. A process object created and held by theprocess manager 906 is responsible for looping through and causing one or more low-level constructs or operation handlers to be called. Unlike traditional platforms, the conceptual foundation of the network operating system is based on process-oriented operations that model low-level constructs. Higher-level constructs that, for example, model workflows, product lifecycle management, user collaboration, and the like, are constructed from these low-level constructs. By way of example, the set of operation handlers provided by the present invention that models low-level constructs includes, but is not limited to, an open operation handler, bind operation handler, change operation handler, decision operation handler, and the like. Moreover, an operation API is provided that allows developers to define additional operation handlers. In this way, the XML virtual machine may be extended to support and execute additional low-level constructs. On the other hand, the operations that may be used in an application are limited to those operations either created in accordance with the operation APIs or provided by the present invention. As a result, the ability of users to create malware or otherwise implement malicious functionality is severely restricted since only a limited and well-defined set of operations are available to execute application logic. On one hand, since there are only a limited number of ways to manipulate an XML document, a relatively small number of operations need to be provided. Since XML is a very general language, any application or domain may be described utilizing the language. Accordingly, the process XML language and its corresponding operations provided by the present invention is capable of describing any type of process logic and may be used to describe any type of application. - In accordance with one embodiment, an instance object is provided by the present invention that tracks the “runtime state” of an executing application or instance. Those skilled in the art and others will recognize that the runtime state of an executing application constantly evolves as logic is executed. An instance object tracks and otherwise manages the runtime state of an executing application and supplies context to other objects used to implement the XML virtual machine. Accordingly, instance objects couple operational meaning to the execution of processes and their associated operations. As a result, even though the runtime state of an application instance is constantly changing, operation handlers are provided with data that accounts for these changes. In this way, the present invention supports dynamic execution of application logic using process objects that are stateless. In other words, even though multiple instances of an application may exist, only a single version of the application code is necessary, thereby saving memory.
- As depicted in
FIG. 9 , the client-side component includes aview manager 908 that is responsible for tracking the “views” or user interfaces associated with an executing application. Methods are provided by theview manager 908 for creating an internal view object which is used to render and update an application's user interface. In accordance with the MVC design paradigm, the user interface of an application may be described semantically using the UI XML language. Accordingly, the relationships between components and other graphical attributes of the application's complete user interface may be represented in a UI XML document. View objects instantiated and held by theview manager 908 are utilized in rendering user interfaces that are described semantically in a UI XML document. In one embodiment, the rendering of the user interface may be performed through a series of XML transformations. However, those skilled in the art and others will recognize that a user interface may be rendered without performing XML transformations and the description provided above should be construed as exemplary. In any event, theview manager 908 is configured to create view objects and holds reference to all active views in the system. - As depicted in
FIG. 9 , the client-side component includes adocument manager 912 that is responsible for instantiating and holding reference to document objects. As mentioned previously, XML documents are the data model that serves as a common data source in the network operating system environment. Even application logic, system settings, application states, and the like are represented in XML documents. In one aspect, thedocument manager 912 is responsible for causing documents to be loaded or cached in memory on a client computer. Accordingly, thedocument manager 912 may interact with other managers, such as the communication manager (described below), to obtain documents. Documents may be obtained from a remote network location using a communication channel or a channel can be established to access documents maintained on a local hard drive or other non-volatile memory on a client computer. In another aspect, thedocument manager 912 serves as a client-side cache tracking each document that is loaded into memory on a client computer. When a document is obtained locally, an internal document object that provides a structured object-oriented representation of the document may be instantiated. In this regard, thedocument manager 912 holds references to all document objects in the system and exposes methods for creating, retrieving, saving, and renaming XML documents, among others. - The
event manager 914 visually depicted inFIG. 9 serves as a trigger event bus allowing aspects of the XML virtual machine to execute application logic in response to the activation of a trigger. On one hand, a process object may utilize a notifier object to register a trigger as a listener with theevent manager 914. Other objects within the system such as component objects often register themselves directly as listeners to theevent manager 914. Among other things, the notifier object receives and stores data that identifies the process step in an application that will be executed in response to the trigger being activated. Moreover, data provided by a notifier object associates the trigger with an originating object (i.e., often a view or component object) where the trigger activation will originate. On the other hand, theevent manager 914 allows objects (i.e., view or component objects) to push or otherwise notify registered listeners when a trigger is activated. In this example, the component object will notify and pass data to theevent manager 914. In response, theevent manager 914 will perform a look-up to identify listeners for the activated event. Then, the appropriate notifier or other listening objects may be alerted and provided with data that allows application execution to proceed to the appropriate process step. As described in further detail below, separate application instances may each use the same set of triggers and notifier objects. Providing anevent manager 914 and associated systems that are configured to re-use the same resources in this way both increases performance and minimizes the memory used. - As used herein, a “trigger” refers to the occurrence of a defined triggering event that will cause application code to be executed. Accordingly, in the exemplary
process XML document 600 described above with reference toFIG. 6A , the activation of atrigger 602 causes a particular process step defined in the application code to be executed. In contrast to existing systems, triggers implemented by the present invention are not normally activated upon the occurrence of a data update. In other words, other than specifying operations such as a data binding, developers are not required to provide logic for managing input and output from an application user interface to the data model. Instead, data updates are managed by the present invention by a separate data update notification event bus and do not correspond to the activation of a trigger. As described in further detail below, aspects of the present invention provides a separate event bus implemented in the document object that automatically handles propagation of data update events to components and other objects. - The
transaction manager 910 also depicted inFIG. 9 provides an interface for creating and propagating transactions used to update the contents of an XML document. Accordingly, when a change to the data model will be performed, this will result in a transaction. In this regard, a transaction represents a relative change and may be represented as an XML data fragment that contains data used to implement or reverse a change to the data model. For example, in the MyTasks application described above with reference toFIG. 6A , the change operation 624 that adds a task to an underlying data XML document may result in the creation of a transaction. The data update reflected in a transaction may be persisted to the data model as well as to any remote listeners. In one embodiment, thetransaction manager 910 includes identification and time stamping data when a transaction is created that may be used to “rollback” the data update represented in the transaction as well as identify the order in which transactions are generated. - Now with reference to
FIG. 10A , anapplication initiation routine 1000 will be described that performs processing to open an application package. Theapplication initiation routine 1000 may be performed in response to a user generating a command to launch an application. As mentioned previously, aspects of the present invention may provide a desktop environment in which users launch applications through the selection of a menu item, icon, and the like. In response to receiving this type of command, a data type recognizer within thesystem context object 902 may be passed a URL that identifies the location of a document associated with an application package, XML document, or binary file. As described in further detail below, the data type recognizer is utilized in numerous ways to identify and associate actions with particular types of documents. In any event, theapplication initiation routine 1000 may be performed when the data type recognizer determines that a document that corresponds to an application package (e.g., application package XML document) is being opened. - In the
application initiation routine 1000 depicted inFIG. 10A , theapplication manager 904 is utilized to instantiate an application object atblock 1002. Multiple application objects that each represent a different application may be instantiated and held by theapplication manager 904. On this iteration through theapplication initiation routine 1000, a first application object may be instantiated that, for example, represents a word processing program. On a different iteration through theapplication initiation routine 1000, a second application object that represents a different program (e.g., an e-mail program) may be instantiated. By controlling the instantiation and access to application objects, process logic associated with one application is unable to access the internal objects (e.g., view objects, instance object, process object, etc.) that are associated with a different application. Accordingly, when executing the process logic of the word processing program, a view object associated with the e-mail application package is inaccessible. As described in further detail below, the use of theapplication manager 904 to instantiate and hold application objects is part of a larger framework provided by the present invention that insures both intra-application and intra-process security. - At
block 1004, the resources of an application being opened as specified in a corresponding application package are obtained. Logic in an application package formed in accordance with the present invention provides the overall blueprint of the resources and settings of an application. Accordingly, an application package XML document may identify process and UI XML documents associated with an application, as well as other application resources such as images, data documents, XSLT documents, among others. Resources utilized by an application, including the application package XML document itself, may be cached in memory on the client or obtained from a service provider utilizing a communication channel (described below). In addition to resource and settings management, the application package XML language allows developers to configure application packages in more advanced ways. By way of example only, conditional logic in an application package XML document may be used to implement a more fault-tolerant network service in which resources can be obtained from a failover network location. In the event that a primary network location is unavailable, the application package can identify alternative network locations where the resources may be obtained. However, this is just one example of the way the present invention allows developers to configure an application package using the package XML language. - As further illustrated in
FIG. 10A , atdecision block 1006, theapplication initiation routine 1000 determines whether additional runtime instance(s) of the application is permitted. The application package XML language allows developers to establish configurations to limit the number of application instances that may be created. Accordingly, the determination made atblock 1006 may be dependent on configurations defined in an application package XML document. If the determination is made, atblock 1006, that an additional instance is not permitted, then theapplication initiation routine 1000 proceeds to block 1008 where the command to launch an application that does not allow an additional instance is handled. In this regard, handling the command atblock 1008 may include refreshing an existing runtime instance of the application. In addition or alternatively, handling the command may include informing the user through a dialogue that an additional instance of the application is not permitted. Then, upon handling the command, theapplication initiation routine 1000 proceeds to block 1014, where it terminates. - On the other hand, if a determination is made at
block 1006 that an additional instance of the application is permitted, theapplication initiation routine 1000 proceeds to block 1010. Atblock 1010, an instance object is instantiated that tracks and manages the runtime state of the application being launched. When process and view objects are created, aspects of the present invention associate these objects with their corresponding instance. The instance object instantiated atblock 1010 maintains structures for tracking process and view objects, aliases, and other runtime variables. Accordingly, process and view objects associated with this application instance will be known to the instance object. Through the controlled instantiation and referencing of objects, a localized relationship hierarchy may be established that delimits the boundary of an application instance. As described in further detail below, this framework associates process and view objects with a corresponding instance and delimits access to these objects from outside the localized relationship hierarchy. - The context provided by the instance object instantiated at
block 1010 allows functionality to be implemented relative to an application's runtime state. In one aspect, the instance object instantiates and holds a local expression engine for evaluating expressions encountered in application code being interpreted. A process object may utilize a corresponding instance object and a local expression engine that the instance holds to evaluate expressions. Moreover, the instance object instantiated atblock 1010 may be supplied when executing operations in order to couple operational meaning to the execution of process logic. - As further illustrated in
FIG. 10A , atblock 1012, the application object instantiated atblock 1002 is utilized to open and initiate execution of an application's process and view logic. Routines for opening and initiating execution of logic in process and UI XML documents are described below and will not be provided here. Significantly, each time an application associated with an application package is launched, a new instance object will be supplied to track the runtime state of the application. For example, an application object that represents a word processing program will supply a different instance object each time an instance of the word processing application is launched. By utilizing the application object in this way, aspects of the present invention are able to control access to objects that are associated with an executing application. Then, theapplication initiation routine 1000 proceeds to block 1014, where it terminates. - Now with reference to
FIG. 10B , the utilization of application objects to encapsulate applications and provide intra-application security will be described in additional detail. When an application from an application package is launched, theapplication manager 904 instantiates an application object that provides an encapsulated representation of the application. As illustrated inFIG. 10B , theapplication manager 904 may instantiate theApplication Object A 1030,Application Object B 1032, andApplication Object Nth 1034. In one embodiment, an application object is utilized to instantiate and hold one or more instance objects. In the example depicted inFIG. 10B , the Application Object A 1030 may instantiate and hold theInstance Object A1 1036,Instance Object A2 1038, andInstance Object A-Nth 1040. Similarly, theApplication Object B 1032 may instantiate and hold theInstance Object B1 1042 and the Instance Object B-Nth 1044. In this regard, a unidirectional solid arrow between objects depicted inFIG. 10B indicates that the source object where the arrow originates holds the destination object identified by the arrow pointer. Accordingly, the solid arrow from theapplication manager 904 to the application objects 1030-1034 indicates that these objects are held byapplication manager 904. From the illustration inFIG. 10B , the relationship between theapplication manager 904, application objects 1030-1034, and their corresponding instance objects 1036-1044 is apparent. - The relationship between objects depicted in
FIG. 10B illustrate how the present invention is able to ensure intra-application security. Access to application objects is controlled by theapplication manager 904 which exposes methods for creating, opening, and terminating applications. When an application object is instantiated, theapplication manager 904 isolates the application object into a separate memory space. By preventing application objects from sharing a memory space, code from one application may not be injected into or otherwise affect the memory space allocated to a different application. Moreover, an application object provides an encapsulated representation of an application in which internal data associated with the application may be hidden. All of the functionality of the application and access to internal data is controlled through the creation of exposed methods. By isolating and encapsulating applications in this way, the internal objects (e.g., view objects, instance object, process object, etc.) associated with one application are rendered inaccessible to a different application. Accordingly, when executing code utilizing theApplication Object A 1030, internal objects associated with theApplication Object B 1032 may not be accessed. Even though the internal data of an application may not be accessed, data may be shared utilizing the underlying data model. Accordingly, if a user has sufficient access rights, a document may be shared by multiple applications. In other words, the intra-application security framework provided by the present invention does not prevent the authorized sharing of data between applications using the underlying data model. - Now with reference to
FIG. 10C , the utilization of instance objects to implement a localized relationship hierarchy will be described in additional detail. By defining a localized relationship hierarchy, aspects of the present invention allow multi-instance applications to be securely executed. The illustration inFIG. 10C includes theapplication object 1050 andinstance object 1052. In addition,FIG. 10C depicts aprocess object 1054,view object 1056,component object 1058, and adialog object 1060 that are instantiated when an application's process and UI XML documents are opened. In one embodiment, theapplication object 1050 supplies theinstance object 1052 when initiating execution of an application. The dashed unidirectional arrows originating from theapplication object 1050 to theview object 1056 andprocess object 1054 indicate that these objects were created within the localized relationship hierarchy that is specific to the suppliedinstance object 1052. In this regard, theinstance object 1052 maintains aMiniView manager 1062 and aMiniProcess manager 1064. When an application's process XML document is opened, theinstance object 1052 is provided with a reference to the resultingprocess object 1054 that is tracked using theMiniProcess manager 1064. Similarly, theview object 1056 that results when an application view is opened is supplied to theinstance object 1052 and held by theMiniView manager 1062. Accordingly, the updates to theMiniProcess manager 1064 andMiniView manager 1062 allow theinstance object 1052 to track and identify objects that are associated with a particular application instance. - Throughout the code that describes the logic of an application, developers may utilize globally-named objects to define the application's logic. These globally-named objects may be referenced in accordance with an expression language provided by the present invention. However, global names assigned to objects in application code may reference runtime objects that belong to different instances. For example, the following expression may be used in application code to reference the view object 1056: “#MyTasks.” In addition, the following expression may be used to reference a component object (e.g., Button) that is created within the context of the aforementioned view object 1056: “#MyTasks#button1.” To avoid ambiguity and enforce security, aspects of the present invention implement functionality that allows globally-named objects encountered in application code to be evaluated relative to the appropriate instance. In this regard, the evaluation of globally-named objects is performed without creating duplicate process or UI XML documents. Instead, an application's process and UI documents are shared and used to build the runtime objects for multiple application instances. As will be clear in the description that follows, the implementation of a localized relationship hierarchy provides a basis for identifying and/or supplying the appropriate instance when expressions are evaluated and accessing the appropriate view object within the instance.
- In the example depicted in
FIG. 10C , a bidirectional arrow is depicted between theinstance object 1052 and theview object 1056. On one hand, the bidirectional arrow indicates that theinstance object 1052 is aware that theview object 1056 is associated with this particular application instance. Upon being instantiated, theview object 1056 may be supplied to theinstance object 1052 and held by theMiniView manager 1062. On the other hand, an identifier for theinstance object 1052 is supplied when an application view is created so that theview object 1056 is aware of its associated instance. As a result, the appropriate instance may be identified when input is received that will cause a data update or application logic to be executed. For example, thecomponent object 1058 may be instantiated when theview object 1056 is used to open an application view. Since thecomponent object 1058 is created within the context of an application view, it may communicate with theview object 1056. As a result, thecomponent object 1058 may identify theappropriate instance object 1052 when, for example, a user provides input that will cause application code to be executed. - In the example depicted in
FIG. 10C , a unidirectional arrow is depicted between theinstance object 1052 and theprocess object 1054. In one embodiment, the process steps in an application are executed using theprocess object 1052. Through the utilization and updating of theMiniProcess manager 1064, theinstance object 1052 is aware of its associatedprocess object 1054. However, process objects provided by the present invention are stateless between execution of process steps. As a result, process objects are supplied with the context from asingle instance object 1052. In other words, theprocess object 1052 is not aware of an associatedinstance object 1052 between execution of process steps. However, theprocess object 1054 may utilize the services of an expression engine (described below) that is held by a suppliedinstance object 1052. The localized relationship hierarchy depicted inFIG. 10C and the associated description illustrates how the present invention is able to ensure intra-process security while still supporting multi-instance applications. When iterating through the operations in a process step, theprocess object 1054 may only be supplied context from oneinstance object 1052. This framework in which relationships are established, so that theprocess object 1054 is supplied context from asingle instance object 1052, allows a strict separation between objects associated with different instances. Accordingly, when executing application code, theprocess object 1054 is not able to access objects that are in the localized relationship hierarchy of a different instance. - Aspects of the present invention are able to create sub-instances within a localized relationship hierarchy established by a parent instance. In this embodiment, the sub-instance and its resulting sub-view object and sub-process objects are created within a localized relationship hierarchy of the parent instance. The localized relationship hierarchy delineated by the sub-instance is visible to objects created within the relationship hierarchy of the parent instance. However, runtime objects that are created within the sub-instance are not aware of objects associated with the parent instance or other sub-instances. This ability to nest sub-instances within a parent instance offers great flexibility to application developers in building more modular code as well as the ability to utilize different scopes.
- Now with reference to
FIG. 11 , aprocess initiation routine 1100 for opening and initiating execution of logic defined in an application's process code will be described. The process initiation routine 1100 may be performed when a call to open a document that contains process logic is generated. In one embodiment, calls to open a file may be issued to the data type recognizer that receives a URL from a calling object. The URL passed to the data type recognizer may correspond to any type of document including, but not limited to, an application package XML document, process XML document, or UI XML document. When opening a document that contains process logic, the data type recognizer may cause particular actions to be performed that facilitate application execution. In the exemplary embodiment depicted inFIG. 11 , the data type recognizer determines that the supplied document is a process XML document and causes actions that are specific to this file type to be performed. - The process initiation routine 1100 depicted in
FIG. 11 illustrates two exemplary circumstances in which a process XML document may be opened. However, the examples provided below should be construed as exemplary as process XML documents may be opened in other circumstances without departing from the scope of the claimed subject matter. As illustrated inFIG. 11 , the process initiation routine 1100 begins either atblock 1102 orblock 1104. In an exemplary embodiment, the routine 1100 begins atblock 1102 where the data type recognizer receives a call to open a process XML document that is associated with an application package. In this embodiment, an application object supplies a previously created instance object in the call received atblock 1102. As described in further detail below, the process initiation routine 1100 will instantiate a process object in anticipation of executing process steps defined in the process XML document. A reference to this process object may later be provided to the corresponding instance that is supplied in the call received atblock 1102. - In an alternative embodiment, the process initiation routine 1100 begins at
block 1104 where the data type recognizer receives a call to open a process XML document that represents a stand-alone application. Applications are not required to be associated with an application package. In this embodiment, the data type recognizer does not receive a supplied instance atblock 1104 in the call to open the process XML document. Applications that are configured to be stand-alone in this way do not support multiple instances of execution and allow applications to share at least some memory space. - At
block 1106, processing is performed by the data type recognizer to identify the file-type of the document that will be opened. In this example, the analysis performed by the data type recognizer will determine that the document associated with the received call is a process XML document. As mentioned previously, the data type recognizer may associate actions with a particular file type. Upon encountering a request to open a process XML document, the data type recognizer is configured to call theprocess manager 906, atblock 1108, indicating that request to open a process XML document has been received. - At
decision block 1110, logic within theprocess manager 906 determines whether a process object for this process XML document is cached in memory. In one aspect, the process initiation routine 1100 is responsible for instantiating a new process object when an application is initially launched. Once instantiated, logic is implemented by the process initiation routine 1100 that enables the newly instantiated process object to execute a process step. Since the process object is stateless, it may be reused. As such, the same process object may be used to execute application code from the same instance of an application package or other processes embedded in the process XML document. Accordingly, the process object instantiated when an application is launched may be cached in memory by theprocess manager 906. If theprocess manager 906 previously instantiated a process object for this application that is still in memory, the result of the test performed atblock 1110 is “yes,” and the process initiation routine 1100 proceeds to block 1120, described in further detail below. Conversely, if a determination is made that a new process object will be instantiated, the process initiation routine 1100 proceeds to block 1112. Before the new process object is instantiated, the process XML document being opened should be available locally. To this end, theprocess manager 904 generates a call that is routed through thedocument manager 912 to obtain the appropriate process XML document atblock 1112. - At
block 1114, a determination is made regarding whether the process XML document being requested by theprocess manager 904 is loaded into memory of the client computing device. As mentioned previously, thedocument manager 912 serves as a client-side cache, tracking each document that is loaded in memory on the client. If a determination is made that the process XML document being opened is referenced in the client-side cache maintained by thedocument manager 912, then the process initiation routine 1100 proceeds to block 1118, described in further detail below. Conversely, if the requested process XML document is not loaded in the client-side cache, the process initiation routine 1100 proceeds to block 1116, where thedocument manager 912 causes the requested process XML document to be obtained from a service provider. More specifically, atblock 1116, thedocument manager 912 utilizes the communication manager (described below) to request that the appropriate process XML document be obtained from a network location identified by a supplied URL. - Once the process XML document is available from the client-side cache, a new process object is instantiated at
block 1118. Specifically, logic within theprocess manager 904 is utilized to instantiate a new process object in anticipation of executing application code. Then, the new process object is registered atblock 1120 as a listener on its corresponding process XML document. As described in further detail below, by registering as a listener on a document in the data model, an object may be notified and take certain action when a specified data update to the document is performed. - At
block 1122, notifier objects are instantiated for each trigger in the application. Specifically, parsing may be performed to identify the trigger elements defined in the process XML document being opened. By way of example, the MyTasks application defines a trigger 602 (FIG. 6A ) that would result in a notifier object being instantiated atblock 1122. Triggers may be defined as elements in a process XML document with each trigger including the view, component, event, and step attributes. The value assigned to the view and component attributes identifies the application view and/or component where the trigger will be activated. Similarly, the value assigned to the event attribute identifies the type of event that will activate the trigger. Moreover, the value assigned to the step attribute identifies the process step in the application's process code where execution will be directed in response to the trigger. For each trigger in an application, logic within theprocess manager 906 instantiates a notifier object and caches data in the notifier object that may be subsequently used to execute a particular process step. - As further illustrated in
FIG. 11 , each trigger defined in an application is registered with theevent manager 914 atblock 1124. In one embodiment, theevent manager 914 maintains an internal hash data structure that associates a set of trigger data with listening notifier objects. Accordingly, triggers may be registered by updating the hash data structure maintained by theevent manager 914. As described in further detail below, theevent manager 914 notifies the appropriate listening objects and notifier objects when an event that matches a registered event for a component and event type occurs. - As further illustrated at
FIG. 11 , a determination is made atblock 1126 regarding whether a new instance will be instantiated. When opening a process XML document, the instance may be supplied. Specifically, theapplication initiation routine 1000 described above may instantiate and supply the instance when opening a process XML document. Also, instances may be supplied in other circumstances in order to support modular application development and for different processes to share context. In these embodiments, a new instance will not be instantiated, and the process initiation routine 1100 proceeds to block 1130, described in further detail below. Conversely, if an instance object was not supplied, the process initiation routine 1100 proceeds to block 1128, where an instance object is instantiated. Specifically, logic within theprocess manager 906 generates a call to instantiate the new instance object atblock 1128. - At
block 1130, a call to execute a process step defined in a process XML document is generated. In an actual embodiment, a process object is configured to cause a process step to be executed based on two received parameters: (1) a supplied instance representing the runtime state of an application; and (2) the identifier of the process step that will be executed. In this regard, the instance that is supplied to the process object may be created within the context of an application package or a stand-alone application. In either embodiment, the process initiation routine 1100 is configured to provide a process object with parameters that allow the process object to be re-used for multiple instances in executing each process step defined in the process XML document. Then, the process initiation routine 1100 proceeds to block 1132, where it terminates. - When a process step will be executed, flow of control is directed to an execute method encoded within a process object. Generally described, the execute method loops through and causes each operation defined in a process step to be executed. In other words, the execute method is the interface to the process operations developed in accordance with the process operation API. As such, the execute method could be called by the process initiation routine 1100 in order to execute process step “1” defined in the MyTasks application. In response, the execute method would perform processing that causes the Open, Bind, and Action operations 612-616 within this
process step 604 to be executed. - Now, with reference to
FIGS. 12A-B , an executemethod 1200 will be described that is configured to cause operations in a process step to be executed. As illustrated inFIG. 12A , the executemethod 1200 begins atblock 1202 where a new operation within a process step is identified. In one embodiment, operations within a process step are typically identified and executed sequentially. Upon encountering a new operation, an expression provided in the value attribute of the operation is selected for evaluation atblock 1203. For example, in the MyTasks application described above, the MyTasks document 600 (FIG. 6A ) defines an InitializeApplication process step 604. Within thisprocess step 604, the first operation is anOpen operation 612 having a value attribute “apps/mytasks_gui.xml.” On this iteration through the executemethod 1200, the expression “apps/mytasks_gui.xml” would be selected for evaluation atblock 1203. - The descriptions made with reference to
FIG. 12 provides examples in which operations within a process step are executed sequentially. However, aspects of the present invention support asynchronous execution of operations so that each operation in a process step may not be executed sequentially. For example, if a first operation requested a resource that is only available from a remote network location, other operations (that are not dependent on the results of the first operation) may be executed while the resource is obtained asynchronously. - As further illustrated in
FIG. 12A , the expression selected for evaluation atblock 1203 is evaluated into an XBind atblock 1204. As used herein, an XBind is a data type that comprises a URL, base path (e.g., an XPath expression that references an XML fragment within the document identified by the specified URL), and a selection (e.g., a plurality of XPath expressions). In the exemplaryOpen operation 612 defined in the MyTasks application, the “apps/mytasks_gui.xml” expression would be evaluated into the following XBind, at block 1204: - URL=apps/mytasks_gui.xml
- Base path=/
- Selection=
- The URL of this XBind references the UI XML document that provides the semantic description of the application's user interface. While the examples provided herein utilize a URL as the format for identifying resources this should be construed as exemplary. Any system that is capable of uniquely identifying a resource may be implemented in conjunction with the present invention. As described in further detail below, the network operating system provides protocols and abstractions for accessing an XML file system, databases, and XML web services using URLs. However, it is contemplated that other protocols could be used to identify resource locations other than URLs. The base path of the above XBind is “I” which references the root element of the UI XML document identified in the URL. When opening an application view, the base path could reference a fragment within a UI XML document. In this instance, the semantic description of the view logic is not associated with the root node of the UI XML document. Accordingly, the XBind for this variation would include a base path referencing the node that corresponds to the view logic. The selection for this exemplary XBind is “null” as it does not contain data. Once the expression has been evaluated, the execute
method 1200 proceeds to block 1206, described in further detail below. - With reference now to
FIG. 12B , an interchange that occurs when an expression is evaluated will be described. The illustration inFIG. 12B includes a set of objects that include theinstance object 1250, theprocess object 1252, and theview object 1254. Similar to the description provided above with reference toFIG. 10C , the dashed arrows depicted inFIG. 12B indicate that the process and view objects 1252-1254 were previously associated with the localized relationship hierarchy that is specific to theinstance object 1250. Within the executemethod 1200, theprocess object 1252 may utilize theinstance object 1250 to evaluate an encountered expression. Since theinstance object 1250 is supplied when execution of a process step is initiated, theprocess object 1252 may utilize theinstance object 1250 within the process step in order to have the expression evaluated by theexpression engine 1260. - In one embodiment, the present invention implements an
expression engine 1260 configured to evaluate expressions within the context provided by the instance. Specifically, functionality encapsulated in theexpression engine 1260 may be used within the context of theinstance object 1250 to evaluate theexpression 1262 into theXBind 1264, XML formatted data, or plain text. Once evaluated, theXBind 1264 identified by theexpression engine 1260 may be passed from theinstance object 1250 to theprocess object 1252. By utilizing theinstance object 1250 to instantiate and hold thelocal expression engine 1260, evaluation of expressions is readily performed relative to the context supplied by the instance or any sub-instance. Among other things, utilizing alocal expression engine 1260 in this way allows instance and scope handling to be performed within a multiple chained scope depth. Accordingly, expressions may be evaluated differently, depending on the application instance that is executing, and developers are not required to account for the complexity of managing multiple instances or scopes. Additional descriptions of the functionalities implemented within theexpression engine 1260 and the types of expressions that may be evaluated by the present invention will be described in further detail below. In this regard, theexpression engine 1260 may be used to evaluate multiple expressions defined within an operation. Each of these expressions within the operation is evaluated before an operation handler is called, as described in further detail below. - With reference again to
FIG. 12A , the executemethod 1200 initiates execution of the appropriate operation handler atblock 1206. As mentioned previously, a plurality of operation handlers are provided by the present invention. Each operation handler implements functionality specific to the type of operation that may be encountered. Accordingly, if the current operation is an open operation, then the executemethod 1200 calls an open operation handler atblock 1206. However, other operation handlers are implemented (Bind, Decision, Action, Change, etc.) that may be called within the executemethod 1200. Accordingly, the executemethod 1200 is configured to pass arguments that are appropriate for the particular operation handler being called using a well-defined process operation APIs, which will be discussed in the examples below. However, each operation handler is supplied with at least instance and process objects and an evaluated XBind when called. - At
decision block 1208, the executemethod 1200 determines whether additional operations in a process step will be executed. Accordingly, if all of the operations in the current process step were not previously executed, the executemethod 1200 proceeds back toblock 1202, and blocks 1202-1208 repeat until each operation has been executed. Significantly, a process step may include a statement that directs the flow of application execution. For example, a “call” statement may be defined as a statement in a process step that directs the flow of execution to a different process step once all of the operations in the current process step have been executed. More generally, a “call” operation is provided that allows developers to direct the flow of execution between operations of one process step to a different process step. When a “call” operation is defined, flow proceeds to the new process step and, upon completion, returns to a location within the originating process step. In an actual embodiment, asynchronous calls, time delay calls and time repeated interval calls may be generated using the “call” operation. Then, once all of the operations have been executed, the executemethod 1200 proceeds to block 1210, where it terminates. - As mentioned above, the execute
method 1200 initiates execution of particular operation handlers when interpreting application logic. With continuing reference to the MyTasks application described above, the functionality implemented by particular operation handlers will be described. Since an operation handler implements a state change, all data that an operation handler utilizes is supplied. Moreover, aspects of the present invention are configured so that operation handlers do not return data. As such, operation handlers may be implemented as stand-alone functions that are supplied with everything used to execute without returning data. Accordingly, process operations in an application may be executed locally. However, since operation handlers are stand-alone functions, they may be provided as a Web service, from a server-side data center. - Now with reference to
FIG. 13 , an exemplaryopen handling routine 1300 that utilizes an open operation handler will be described. In the exemplary MyTasks application described above (FIG. 6A ), the application defines anOpen operation 612 having a value attribute that may be evaluated to an XBind within the execute method 1200 (FIG. 12A ). Accordingly, an open operation handler may be called to execute theopen operation 612. In one embodiment, arguments may be passed in the call to the open operation handler that include a previously evaluated XBind and the appropriate instance and process objects. - As illustrated in
FIG. 13 , atblock 1302, the data type recognizer is called within the open operation handler to open a document. As mentioned above, a previously evaluated XBind may point to a document or fragment (node) within a document that is being opened. Among other things, the open operation handler passes this previously evaluated XBind that identifies the document being opened in the call to the data type recognizer. Upon receiving the call, the data type recognizer performs processing atblock 1304 to identify the file type of the document referenced in the received XBind. In the exemplary MyTasks application, the XBind passed to the data type recognizer references the document entitled “MyTasks_gui.xml.” In this example, the data type recognizer would identify the file type as being an UI XML document. As mentioned previously, logic is provided within the data type recognizer that associates actions with particular file types. An exemplary set of actions initiated when the data type recognizer is utilized to open a UI XML document are described below. - At block 1306 of the
open handling routine 1300, the data type recognizer passes a command to theview manager 908 indicating that a request to open an UI XML document has been received. Specifically, theview manager 908 is called to create a view object that will be used to render a new user interface or application view. As mentioned previously, the user interface of an application may be described semantically in an UI XML document (e.g., “MyTasks_gui.xml”). In this regard, multiple view objects may be associated with each application instance. Accordingly, in the call to theview manager 908, the identifier of the appropriate instance and the UI XML document that describes the new view may be supplied by the data type recognizer. - As further illustrated in
FIG. 13 atblock 1308, execution of logic that provides the semantic description of a new application view is initiated. As mentioned previously, theview manager 908 is responsible for instantiating a view object and performing tasks that allow an application view described in a UI XML document to be rendered. To render a new application view, component and dialog objects are instantiated utilizing a view object. As described in further detail below with reference toFIG. 23 , these objects provided by the present invention implement functionality that allow graphical elements described semantically in a UI XML document to be rendered on a computer display. Then, theopen handling routine 1300 proceeds to block 1310, where it terminates. - Now with reference to
FIGS. 14A-14B , the utilization of a data type recognizer in opening process and UI XML documents will be described in additional detail. The illustration inFIG. 14A depicts theprocess object 1400,open operation handler 1402,data type recognizer 1404,instance object 1406,view manager 908, and theview object 1408 that interact when an UI XML document is opened. Accordingly, the block diagram depicted inFIG. 14A may correspond to the objects that are utilized by the open operation handling routine 1300 described above with reference toFIG. 13 . The opening of an application view may be initiated by theprocess object 1400, which calls theopen operation handler 1402 to open a particular document identified by an evaluated XBind. Upon receiving the call, theopen operation handler 1402 utilizes the data-type recognizer 1404 to identify a file type and cause the appropriate actions to be performed. In the embodiment when a UI XML document is passed from theopen operation handler 1402 to thedata type recognizer 1404, actions are defined that facilitate opening and initiating execution of an application's view logic. Moreover, thedata type recognizer 1404 is utilized to associate the resultingview object 1408 with theappropriate instance object 1406. - In the example depicted in
FIG. 14A , theview manager 908 is called by thedata type recognizer 1404 when a call to open a UI XML document is received. In order to open and execute logic in an UI XML document, theview manager 908 instantiates and supplies theview object 1408 an identifier of theinstance object 1406 and an XBind referencing the appropriate UI XML document. By passing data in this way, theview object 1408 becomes aware of its associated instance. Once theview object 1408 is instantiated, execution of logic that provides the semantic description of the new application view is initiated utilizing functionality that is similar to the process initiation routine 1100 (FIG. 11 ) described above. Specifically, theview manager 908 may cause the appropriate UI XML to be loaded into the client-side cache. Then, theview object 1408 may be instantiated and used to render an application's user interface components and dialogs. However, unlike processes, multiple view objects may be instantiated and associated with the same instance. - In an actual embodiment, aspects of the present invention support lazy loading and/or rendering of an applications' UI logic. To this end, XLinks implemented in accordance with a standard defined by the World Wide Web Consortium may be utilized to perform lazy loading and/or rendering of one or more UI XML documents. Those skilled in the art and others will recognize that an XLink may be included in an XML document that describes a link between different XML resources. Unlike traditional HTML-based hyperlinks that provide meaning to users in linking Web pages, XLinks are more readily interpreted by software systems and computers. Significantly, XLinks may contain logic that defines the conditions that will activate the XLink as well as the actions to be taken upon the activation. As a result, XLinks are well-suited for performing on-demand and/or lazy rendering of an applications UI logic. Instead of loading all of an applications' UI logic when an the application is launched, XLinks may be defined for linking to the appropriate XML resource on demand. For example, in the exemplary MyTasks application described above, the
Button2 component 704 is “hidden” after all of the applications' user interface logic is loaded and rendered. Equivalent functionality and improved performance may be achieved by using an XLink to load and/or render the UI logic of theButton2 component 704 when needed. In this example, the user interface logic associated with theButton2 component 704 in theMyTasks_gui.xml document 650 may include an XLink that references a local or remote resource (e.g., another UI XML document) that defines the relevant user interface logic. When dictated by application logic, this XLink may be used to load and/or render the UI logic corresponding to theButton2 component 704. - Once the
open operation handler 1402 completes, the resultingview object 1408 is returned to thedata type recognizer 1404. Then, thedata type recognizer 1404 associates theview object 1408 with the appropriate instance. Specifically, when a new application view is created, thedata type recognizer 1404 passes the resultingview object 1408 to theinstance object 1406. In response, theMiniView manager 1412 is updated, thereby associating theview object 1408 with a corresponding instance. A more complex name is assigned to theview object 1408 within theView manager 908 than is allocated to the same object by theMiniView manager 1412. Specifically, the name assigned to theview object 1408 within theView manager 908 includes the identifier of thecorresponding instance object 1406. As described in further detail below, by implementing a system for naming objects in this way, the same view may be differentiated between multiple application instances. By controlling the passing of data in this way, aspects of the present invention implement localized relationship hierarchies that delimit the bounds of an application instance. - Now with reference to
FIG. 14B , the utilization of thedata type recognizer 1404 in opening a process XML document will be described in additional detail. Similar toFIG. 14A , the illustration inFIG. 14B depicts theprocess object 1400,data type recognizer 1404,instance object 1406, as well as theprocess manager 906. Accordingly, the block diagram depicted inFIG. 14B may correspond to the objects utilized by the process initialization routine 1100 (FIG. 11 ). When a process XML document is opened, thedata type recognizer 1404 is utilized either in the context of an application package or stand-alone application to identify the file type of the document. In this example, thedata type recognizer 1404 defines actions that facilitate opening and initiating execution of logic described in the process XML document. Specifically, flow of execution proceeds from thedata type recognizer 1404 to theprocess manager 906 which instantiates theprocess object 1400. Once a process XML document has been opened, a reference to the resultingprocess object 1400 may be returned to thedata type recognizer 1404. Then, thedata type recognizer 1404 supplies theinstance object 1406 with a reference to the resultingprocess object 1400. In response, theMiniProcess manager 1414 is updated, thereby associating theprocess object 1400 with a corresponding instance. - With reference to
FIGS. 15A-B , an action operation that provides an example regarding the use of the MiniView manager in facilitating process execution will be described. Once theOpen operation 612 in the MyTasks application has been executed, flow of execution proceeds to the Action operation 614 (FIG. 6A ). In this regard, an action handling routine 1500 will be described with reference toFIGS. 15A-B which illustrates both the logic as well as the interactions between objects involved in implementing the routine 1500. - As illustrated in
FIG. 15A , the expression represented in the value attribute of theAction operation 614 is evaluated into an XBind, atblock 1502. In the exemplary MyTasks application, theAction operation 614 contains a value attribute of “#MyTasks” which would be evaluated into an XBind atblock 1502. With specific reference now toFIG. 15B , functionality encapsulated in theexpression engine 1550 may be used by theinstance object 1552 to evaluate the “#MyTasks” expression into an XBind. In this example, theexpression engine 1550 is configured to perform a lookup in theMiniView manager 1554 for the view object that is named “MyTasks.” When a new application view is created, the resulting view object is passed to a corresponding instance which updates theMiniView manager 1554 accordingly. In this regard, the MyTasks view object is assigned a straightforward name within theMiniView manager 1554 held by the instance than the more complex identifier used for the views in theglobal View Manager 908. The more complex name is not needed within the instance, since the complex name is used to differentiate the views belonging to different instances and applications. This information is something the instance and itsMiniView Manager 1554 already knows, since theMiniView Manager 1554 holds its own views. By providing this architecture, theexpression engine 1550, with the assistance of theMiniView Manager 1554, is able to differentiate between views that are associated with different instances and applications. Therefore, in the exemplary MyTasks application, theMiniView manager 1554 would include a view object named “MyTasks.” The view object would also include a reference for the instance in which this view object is associated. In evaluating the “#MyTasks” expression, theexpression engine 1550 would identify theMyTasks view object 1558 as the source or “emitter” of the operation. Specifically, theMyTasks view object 1558 associated with theinstance object 1552 is identified as the emitter and not a “MyTasks” view object associated with a different instance. Since theexpression engine 1550 evaluates expressions relative to the instance, the correctMyTasks view object 1558 that was the source of the event is identified utilizing theMiniView manager 1554. - In this example, the XBind returned to the
process object 1556 would include the URL referencing theMyTasks_gui.xml document 650 and theMyTasks view object 1558. An indicator would be included with the XBind that theMyTasks view object 1558 is the emitter or source of the operation being executed. In cases when the lookup in theMiniView manager 1554 does not identify a match to the object referenced in the expression, theexpression engine 1550 is configured to perform a lookup in theview manager 908 to obtain the relevant view object. - At
block 1504 of the routine 1500, theprocess object 1556 initiates execution of theaction operation handler 1560. In the exemplary MyTasks application, the XBind previously evaluated using theexpression engine 1550 and the emittingMyTasks view object 1558 are passed by theprocess object 1556 to theAction operation handler 1560. Then, atblock 1506, theaction operation handler 1560 causes the method, as specified in the applications process logic, to be performed. In this example, theAction operation 614 in the MyTasks application defines the following “<component>” XML element that identifies the method and target of the action to be performed: - <component name=“button2” action=“hide” value=“”></component>
- By defining this element, the application code is directing that the component named “button2” be hidden. In one aspect, view objects are encoded with generic methods for performing state manipulations on their associated user interface components including, but not limited to, enable, disable, hide, and show methods, etc. Since the
MyTasks view object 1558 is passed to theaction operation handler 1560, these generic methods may be called directly on theobject 1558. In this example, the action operation handler calls the “hide” method on theMyTasks view object 1558 and identifies theButton2 component 1562 as the target component that will be hidden. Then, the action handling routine 1500 proceeds to block 1508, where it terminates. - Now with reference to
FIG. 16 , the implementation of a bind operation handler will be described in additional detail. Once the Open and Action operations 612-614 in the MyTasks application has been executed, flow of execution proceeds to the Bind operation 616 (FIG. 6A ). As illustrated inFIG. 16 , the expression represented in the value attribute of theBind operation 616 is evaluated into an XBind and returned to the appropriate process object, atblock 1602. Similar to the description provided above, the process object utilizes an expression engine that is local to the instance to evaluate the provided expression. In theexemplary Bind operation 616, the “data/tasks.xml” expression would be evaluated into the following XBind, at block 1602: - URL=data/tasks.xml
- Base path=/
- Selection=
- The URL of this XBind references the data document that stores task descriptions. Moreover, the base path references the root node of the data document corresponding to the URL and the selection aspect of this exemplary XBind is null.
- At
block 1604 of the bind handling routine 1600, the process object being utilized to execute the current process step initiates execution of a bind operation handler. In the call, the bind operation handler receives a previously evaluated XBind and the appropriate process and instance objects. As mentioned previously, developers are able to create operation handlers in accordance with the process operation APIs that define function call parameters and the XML semantic structure that may exist within the body of the operation. In this example, the Bind operation 616 (FIG. 6A ) defines the following “<component>” XML element 618: - <component view=“MyTasks” name=“input3” select=“/tasks/task/@description”>
- Accordingly, the bind operation handler (called at block 1604) is responsible for interpreting this logic to bind a particular component to a fragment within an XML document. More generally, each operation handler is responsible for interpreting the logic defined in the child elements of the operation element. In this regard, the process operation APIs allow developers to define the XML syntax in the body of the operation so that the logic executed within an operation handler may be configured as needed.
- At
block 1605, the view object corresponding to the component that will be bound to the underlying XML document is identified and returned to the bind operation handler. In this example, the component element 618 interpreted by the bind operation handler identifies the “Input3” component as being created within the context of the “MyTasks” view object. Since the appropriate instance object is supplied to the bind operation handler, the correct view object may readily be identified. Specifically, a lookup in theMiniView manager 1554 of the instance is performed and the “MyTasks” view object is returned directly to the bind operation handler. - As illustrated in
FIG. 16 , a translated XBind is created within the bind operation handler atblock 1606. The XBind that is passed into the bind operation handler identifies a document (“data/tasks.xml”) that stores content utilized by the MyTasks application. However, only a subset of the data in the identified XML document will be bound to the Input3 component. Accordingly, the binding performed by thebind operation 616 in this example is configured to narrow the binding of the Input3 component to a fragment of the data in the “data/tasks.xml” document identified by an XPath expression. Specifically, the select attribute in the component element 618 includes an XPath expression that qualifies the expression in the value attribute of thebind operation 616. In this example, the XPath expression identifies the appropriate fragment within the XML document that is used to qualify the incoming XBind to the bind operation handler and create the following translated XBind: - URL=data/tasks.xml
- Base path=/tasks/task/@description
- Selection=
- The aforementioned translated XBind could be written in shorthand notation as “data/tasks.xml#/tasks/task/@description.” In this regard, the URL of the translated XBind references the XML document in the data model that stores the relevant task descriptions. Within the XML document identified by the URL, the base path references the task element and its corresponding description attribute. As described in further detail below, an XBind may also include a “Selection” that provides additional features in referencing fragments in the data model.
- At
block 1608 of the bind handling routine 1600, the set data function provided by the appropriate user interface component is called. In this example, the Input3 component is the subject of theBind operation 616 and will be bound to a list of task descriptions. The component APIs may be used to define certain methods for setting data on a particular component. In one embodiment, the Input3 component may include a set data method that is called atblock 1608. Significantly, the appropriate component may be identified based on the view object and the reference to the component name received atblock 1604 when the bind operation handler was called. - When called, the set data method will typically perform administrative functions and error handling to ensure that a component is not already bound to an XML document in the data model. Then, at
block 1612, the Input3 component that is the subject of thebind operation 616 is added as an update listener to the “data/tasks.xml” document. As mentioned previously, the present invention provides a structured object-oriented representation of the XML document in the form of a document object. In one embodiment, document objects serve as a wrapper to DOM (“Document Object Model”) objects utilized by a Web browser and an XML parser. In this regard, enhanced features are encoded within the document object provided by the invention that includes the ability to add any objects that exist within the network operating system environment as listeners for updates made to the data model. By way of example only, the objects that may be data update listeners includes, but is not limited to, processes, views, components, communication channels, etc. Atblock 1612, a call is made to add the Input3 component as an update listener to the object that corresponds to the “data/tasks.xml” document. In this regard, each document object maintains a list of listeners that will be notified in response to a data update. By issuing the call to add update listeners atblock 1612, the Input3 component will become one of potentially many data update listeners on the same document object. - At
decision block 1614, a determination is made regarding whether the component being added as an update listener to a document utilizes rules. In one aspect, the present invention supports functionality that allows rules to be associated with a data binding component. In this regard, a rule handler may be included in the data model that defines how components and other objects will interpret their data binding. As described in further detail below, rules allow generic components to interpret, learn, and take appropriate action depending on the content in the data model. Accordingly, any XML semantics or languages having different elements, attributes, and hierarchies may understand and/or be bound to the same type of generic component. In other words, components that use rules do not need to be created specifically for a certain data model. Instead, rules enable a generic set of components to be used with any type of underlying data and therefore facilitates true data abstraction in the MVC design paradigm. The component does not need to understand the structure of the underlying data model and may use rules to interpret content to achieve the desired functionality. When establishing a binding with a component that utilizes rules, functionality is implemented for setting and/or updating a rule handler so that rules may be applied. In the call to add a component as an update listener, a flag may be included to indicate whether the component is a rule user. Accordingly, if the received flag indicates that the component is not a rule user, the result of the test performed atblock 1614 is “no” and the bind handling routine 1600 proceeds to block 1618, described in further detail below. Conversely, if the received flag indicates that the component is a rule user, the result of the test is “yes” and the bind handling routine proceeds to block 1616. Atblock 1616, aset rule routine 1600 is performed that applies and merges rules of a data binding component to a rule handler maintained in the data model. In this regard, the logic implemented by the set rule routine is described in further detail below with reference toFIG. 21 . - At
block 1618 of the bind handling routine 1600, a call is generated to update the user interface of the component that is the subject of the bind operation. Methods defined in accordance with the component APIs may be used in performing an update of a user interface. Specifically, the component APIs have developers provide logic that is used to implement an “Updated” method for a component. In this regard, logic that may be implemented within the “Updated” method is described in further detail below with reference toFIG. 22 . In this example, the “Updated” method associated with the Input3 component will result in task descriptions maintained in the data model being displayed. Then, the bind handling routine 1600 proceeds to block 1620, where it terminates. Once theBind operation 616 completes execution, the new data binding component will be notified of updates effecting the data model (“data/tasks.xml”). - In the exemplary MyTasks application (
FIG. 6A ), theBind operation 616 is the last operation in the InitializeApplication process step 604 that is executed. Upon execution of theBind operation 616, processing of the MyTasks application remains idle until the occurrence of a trigger. In this regard, atrigger activation routine 1700 is described below with reference toFIG. 17 . However, prior to discussing the utilization of triggers, a description of functionality implemented by the expression engine provided by the present invention will be described in additional detail. - In existing platforms, developers are provided with the same programming tools for both querying data and defining an application's computational logic. In this regard, programming languages that are imperative in nature will eventually cause all of an application's logic to be represented as a sequence of ordered statements. While the ordered nature of imperative programming tools is well-suited for implementing computational logic, the data querying capabilities of imperative languages are less robust. Instead, non-imperative language programming tools would be better-suited for querying or otherwise accessing data. To this end, an expression language is provided that allows developers to utilize non-imperative programming tools when performing I/O. In this regard, expressions are structured to be compatible with XML syntax and delimited for use within the XML-based programming languages provided by the present invention. Specific examples are provided herein of how the process XML language is readily able to utilize expressions. However, these examples should be construed as exemplary, as expressions may be incorporated for use in other XML languages and also evaluated and used directly from program code within objects.
- Implementing a development platform configured to execute applications that adhere to the MVC design paradigm provides challenges with regard to accessing data that may evolve at runtime. In one embodiment, XBinds provide a standardized means for referencing in-memory objects, documents, data subsets, etc. As mentioned previously, an XBind is a three-dimensional data type comprised of an URL, base path (e.g., an XPath expression that may reference a fragment within an XML document or the entire XML document), and a selection (e.g., a plurality of XPath expressions). As will be clear from the examples described below, the XBind data type provides a standardized way for objects that may evolve at runtime to communicate their state. As such, XBinds allow different parts of a loosely coupled system to efficiently communicate their state information in a standardized way. In this regard, XBinds provide a simple and straightforward way of binding data to user interface components. Through the use of the selections, the state of a component is capable of being described in an XBind which may be provided as input into other systems. More generally, each object within the network operating system environment can be queried at any time for an XBind that describes the object's state. Accordingly, an XBind describing the state of an object, (e.g. component) may be set on a different object to “clone” or transfer the components' state. In another aspect, the XBind associated with an object may be synchronized over the network. As a result, objects executing on remote computers may be updated using an XBind to maintain synchronized states. This is one way in which aspects of the present invention enable real-time collaboration over the network.
- In one embodiment, XPath evaluations may be applied by the expression engine. Those skilled in the art and others will recognize that XPath is a standard of the World Wide Web Consortium (W3C) that provides a language for identifying and selecting data at a specified location in an XML document. Moreover, XPath establishes conventions for formulating expressions that evaluate particular values. For example, the XPath expression “/tasks/task/@description” is used in the MyTasks application that includes the abbreviated syntax of the “@” symbol for selecting the attribute named “description.” This syntax complies with XPath conventions and is used to reference a subset of data in an XML document that fulfills a particular select or match parameter.
- The expression language provided by the present invention allows developers to reference in-memory objects that may experience state changes at runtime. For example, the “#MyTasks” and “#MyTask#input3” expressions reference different view and component objects, respectively. Utilizing straightforward notation, developers are able to distinguish between references to these in-memory objects and their data bindings. For example, if a developer is accessing data bound to the “Input3” component instead of a reference to the object itself, the “{#MyTasks#input3}” expression may be used. This particular expression will evaluate to the value found within the XML document referenced in the XBind associated with the Input3 that is within the MyTasks view. Upon encountering an expression that contains curly brackets, the expression engine will convert one or more XML nodes bound to the identified object into text or XML. In this regard, view and component objects provided by the present invention are aware of their data bindings and can always be queried for their XBind. By evaluating expressions relative to an instance, the expression engine is able to identify the appropriate object and a corresponding data binding in evaluating these types of expressions. Accordingly, the expression language allows developers to reference both in-memory objects and their data bindings using the same straightforward notation. Moreover, expressions may reference external resources identified by a URL that will be obtained automatically using a communication channel.
- Unlike existing systems which utilize XPath for navigation and selection of data within documents, aspects of the present invention allow in-memory objects and their associated data to be referenced using XPath conventions. Assuming a component named “Input1” exists within an application view called “MyView,” the following would be a valid expression that is evaluated by the present invention:
- {#MyView#input1#@name}
- After a reference to a XML document, variable, or in-memory object, XPath conventions are applied after the last “#” character in the expression relative to the components XBind. When a relative XPath expression is encountered, the base path or selection within the component will be merged with the supplied XPath as described with reference to the bind handling routine 1600 (
FIG. 16 ). In the exemplary expression provided above, the last “#” denotes that XPath expression (e.g., “@name”) is relative so that this XPath expression will be merged with the components' XBind. However, XPath expressions evaluated by the present invention may also be absolute. In evaluating an absolute XPath expression denoted with the “I” starting character, aspects of the present invention will ignore any base path or selection of the components' XBind. Aspects of the present invention utilize XPath conventions in other ways than those described above. Additional examples of the use of XPath conventions, as well as other types of expressions that may be evaluated by the present invention, may be found in the commonly assigned U.S. Provisional Patent Application No. 60/976,339, entitled “Network-Based Operating System,” filed Sep. 28, 2007, the content of which is expressly incorporated herein by reference. - In one embodiment, properties of an in-memory object may be accessed utilizing the expression language. These properties may be accessed regardless of their data type according to the following syntax:
- #MyView.id
- #MyView#input1.name
- Methods for performing actions on an in-memory object may also be called utilizing the expression language. In this regard, in-memory objects provided by the present invention may be encoded with methods. Utilizing the expression language, methods may be called directly on these objects. For example, the following are types of expressions evaluated by the present invention that would call a method on an object.
- #MyView#maximize( )
- #MyView#input1.clear( )
- Moreover, higher-order expressions that accept other expressions as arguments are evaluated by the present invention. In other words, the expression language supports recursive evaluation of expressions consistent with non-imperative programming techniques as the following example illustrates:
- # MyView#{#MyView#input1.getName( )}
- In this example, the name of the Input1 component is evaluated first in the inner expression using the getName( ) method. The recursively evaluated expression identifying the component name is then provided as a parameter of the outer expression. This is just one example of the way in which non-imperative programming tools are integrated and used in conjunction with the XML programming languages provided by the present invention.
- Within the network operating system environment, process steps and associated operations may be performed in response to the occurrence of a trigger. In other words, the execution of process steps may be event driven. Accordingly, when the
MyTasks.xml document 600 is opened, thetrigger 602 is registered so that flow may be directed to the appropriate process step when the trigger is activated. Atrigger activation routine 1700 will be described with reference toFIGS. 17A-B which illustrate both the flow and interactions between objects utilized to implement the routine 1700. As mentioned previously, theMyTasks.xml document 600 defines thefollowing trigger 602. - <trigger view=“MyTasks” component=“button1” event=“select” step=“2”>
- The
trigger activation routine 1700 depicted inFIG. 17 assumes that a user selected the Button1 component identified within this trigger element, thereby activating thetrigger 602 atblock 1702. - In response to the trigger being activated, the component object where the trigger occurred passes a notify listeners call to the
event manager 914, atblock 1704. In the call, the appropriate component object provides a set of event data and directs theevent manager 914 to notify all event listeners that registered a notifier object or other object matching the supplied data. With specific reference toFIG. 17B , the Button1 component object 1750 associated with theMyTasks view object 1752 would pass a notify listeners call to theevent manager 914 atblock 1704. In the call, an expression identifying the component where the trigger event originated (e.g., “#MyTasks#button1”) as well as the event type (e.g., “select”) is supplied. - At
block 1706, theevent manager 914 alerts one or more listening objects to the activation of the event. Specifically, theevent manager 914 performs a lookup in which the event data passed from the Button1 component object 1750 is matched to data previously provided when the event listener was registered. In this regard, the process initiation routine 1100 (FIG. 11 ) provides a description of how objects may register an event listener in theevent manager 914. In one embodiment, each trigger encountered in a process XML document will cause a corresponding notifier object as an event listener to be pre-cached in memory when an application is initially launched. The notifier object is pre-cached in memory upon the initial launch of the application in anticipation that one or more application instances will cause the trigger to be activated. The pre-cached notifier object is associated with a view name, component name, and event type, which collectively serve as a unique key in performing the lookup atblock 1706. In other words, only when a component within a specified view experiences the type of event identified in the trigger will a corresponding notifier object be notified of the event activation. As such, only a single notifier object will register in theevent manager 914 for a trigger defined in a process XML document regardless of the number of application instances that are executing. Even though multiple instances of an application exist, this architecture allows the same notifier object to be reused by each of the application instances. Additionally, this architecture allows theevent manager 914 to more efficiently iterate and notify listeners since only a single trigger registers an event listener in the form of a notifier object that is then shared by multiple applications instances. In other words, the performance of the lookup performed atblock 914 is not dependent on the number of application instances that are executing. - At
block 1708 of thetrigger activation routine 1700, the appropriate instance that is associated with the activated event (trigger) is identified. When alerted of the occurrence of an event, arguments are passed to theevent manager 914 that are used to identify the appropriate listening object and the affected instance. In this example, the expression identifying the Button1 component object 1750 is supplied to theevent manager 914 and may be utilized to identify the appropriate instance through accessing the components view object that holds a reference to the instance it belongs to. As mentioned previously, when opening an application view, a reference to the instance is supplied to the resulting view object. Accordingly, the MyTasks view object 1754 is aware of its associatedinstance object 1758. Since component objects are created within the context of a view, the Button1 component object 1750 may utilize the MyTasks view object 1754 to identify the appropriate instance, atblock 1708. Once the appropriate instance is known, theinstance object 1758 is supplied to the execute method in the process object. - The architecture depicted in
FIG. 17B and the description provided above illustrates how the present invention is able to support stateless execution of process steps in a system that supports event-driven execution of application logic. As mentioned previously, a single process XML document is utilized to execute multiple applications instances. In this regard, a process object may be repetitively re-used by different application instances thereby providing an efficient platform for executing applications. Even though only asingle notifier object 1756 is pre-cached for each trigger in an application, the present invention allows the appropriate instance to be supplied to theprocess object 1700. In this regard, thenotifier object 1756 is activated when an event matching a unique key comprising the view, component, and event type is received by theevent manager 914. Moreover, theevent manager 914 is able to identify and provide theappropriate instance object 1758 to thenotifier object 1758 utilizing the supplied component, view or event listening object. Atblock 1712 of thetrigger activation routine 1700, a call to execute a process step in an application is generated. As mentioned previously, the process step that will be executed is cached in thenotifier object 1756 or known by the event listening object. Accordingly, once the appropriate instance is supplied, thenotifier object 1756 may call the execute method (FIG. 12 ) atblock 1712 supplying (1) theinstance object 1758 that represents the current runtime state of the application, and (2) the process step (e.g., “2”) in the application's process logic that will be executed. Then, thetrigger activation routine 1700 proceeds to block 1714, where it terminates. Other event listening objects may also call a process object step or directly execute its own custom code. - When the trigger in the MyTasks application is activated, flow of execution proceeds to the
Decision operation 620. Generally described, the logic within thedecision operation 620 performs a test to determine whether any text was entered into the Input4 component when thetrigger 602 was activated. In this regard, a decision handling routine 1800 that implements theDecision operation 620 will be described with reference toFIG. 18 . As illustrated inFIG. 18 , the decision handling routine 1800 begins atblock 1802 where an expression is passed to the expression engine for evaluation. In this example, theDecision operation 620 contains a value attribute of “#MyTasks#input4” which would be passed to the expression engine for evaluation atblock 1802. As mentioned previously, developers may utilize the expression language provided by the present invention to reference in-memory objects. Specifically, the “#MyTask#input4” expression selected and passed to the expression engine for evaluation atblock 1802 references a component object that may experience state changes as an application executes. - At
decision block 1804, a determination is made regarding whether the expression being evaluated references a component that is associated with a data binding. In some instances, a data binding may be defined in which data input and/or displayed by the component is automatically propagated between the component and the data model. On the other hand, a component may be “atomic” or not associated with an existing data binding. When evaluating expressions that reference atomic components, the expression engine implements functionality that allows data input/output from the component or other data affecting the state of the component to be accessed within the logic of an operation handler. By implementing this functionality, the expression engine allows this data to always be accessible using XML-based expressions. - To make the determination regarding whether a component is associated with a data binding at
block 1804, the expression engine may identify the component object named “Input4” using the instance. As mentioned previously, component objects provided by the present invention are aware of their data bindings. Accordingly, once the appropriate component object is identified, the expression engine may readily determine whether the component is atomic or associated with a data binding. If the result of the test performed indicates the component referenced in the expression is not associated with a data binding, then the decision handling routine 1800 proceeds to block 1808, described in further detail below. Conversely, if the result of the test performed atblock 1804 indicates that the expression references a component associated with a data binding, then the decision handling routine 1800 proceeds to block 1806. - If
block 1806 is reached, the component referenced in an encountered expression is associated with a data binding. In this instance, the expression is evaluated without creating a temporary XBind to account for the non-existence of a data binding. More specifically, the expression engine would evaluate the “#MyTasks#input4” expression atblock 1806 and request the XBind from the Input4 component. In this example, the XBind returned by the expression engine would provide the operation handler with everything needed to execute. - In one embodiment, developers may provide XML semantic descriptions to access data and otherwise perform I/O. However, an expression may actually request data that is only available from an in-memory object implemented in a scripting language (e.g., Java Script). Accordingly, even though a component is not associated with a binding, the present invention allows expressions to operate and access data associated with the component using its corresponding in-memory object. For example, the
decision operation 620 in the MyTasks application includes the following “<when>”XML element 622. - <when test=“text( )=” “step=”3″/>
- <otherwise step=“4”/>
- The when
element 622 includes the XPath expression “text( )” which applies XPath evaluation conventions to request text entered into the Input4 component. Since the component is atomic, the requested data is not available using an existing data binding. Instead, the present invention evaluates XML-based expressions and allows data to be accessed even though the requested data is not currently maintained in the data model. Instead, a temporary XBind is created for the object (e.g., component) that references a fragment within a system-provided state document. As described in further detail below, the system-provided state XML document may contain all of the state information of the relevant component. - At
block 1808 of the decision handling routine 1800, the requested data is obtained from an in-memory object associated with an atomic component. Logic implemented within an operation handler may utilize data that involves the state of an atomic component. For example, ifblock 1808 of the decision handling routine 1800 is reached, the Input4 component is an atomic component that is not associated with a data binding. Accordingly, the XPath expression “text( )” within the body of thedecision operation 620 requests data involving the state of the component that is not bound to a known document in the data model. To properly evaluate this type of expression, the requested data should be available from the data model. In this regard, the expression engine is able to query the Input4 component for the relevant data since the XBind requested in the expression does not exist. - In one embodiment, each time an atomic component is referenced in an expression being evaluated, a system-provided state XML document is updated with the current state of the component. As described in further detail below, a temporary XBind may then be created that points to the appropriate fragment within the system-provided state XML document where the requested data may be obtained. Alternatively, the state of every component in the system (regardless of whether the component is atomic or associated with a data binding) may constantly be propagated to a system-provided state XML document utilizing the functionality encapsulated in a State Manager. In this instance, the requested data would already be available from the data model and would be accessible using a translated XBind, as described below. Significantly, this embodiment facilitates synchronization of an application's state across multiple client computers. Moreover, by automatically propagating state information to the data model in this way, the state of an application may readily be restored if the application is closed and subsequently opened.
- At
block 1810, a temporary XBind for accessing data obtained from an atomic component is generated and returned to the appropriate process object. When an application includes an operation that utilizes an atomic component, data may be obtained directly from the component object and stored in the system-provided state document. A translated XBind that is temporarily used to evaluate this expression is generated that references the location in the state document where the requested data may be obtained. In evaluating the “#MyTask#input4” expression, the expression engine may generate an XBind that is similar to the following: - URL=#State
- Base path=/states/state[@qid=‘#MyTasks#input4’]
- Selection=
- The URL of this XBind references the system-provided state XML document allocated to store component state information. Moreover, the base path points to the node within the state document where the text entered into the Input4 component was stored, at
block 1808. Once evaluated, the temporary XBind is returned from the expression engine to the appropriate process object. By storing state information and generating a temporary XBind in this way, aspects of the present invention allow developers to utilize XML-based expressions to reference components and their data regardless of whether the component is associated with a data binding. More generally, all operation handlers that access XML documents are also able to work with and reference atomic objects that are not associated with a data binding. As the examples above illustrate, references to objects (e.g., components) in expressions are evaluated into an XBind. As a result, aspects of the invention allow components to bind to each other. When this type of binding is defined, the second component effectively “clones” the first component's XBind. In other words, the second component is provided with synchronized XBinds from the first component. Data binding between components are even possible when the target of the binding is an atomic component. In this instance, the second component will be associated with an XBind that references the system provided state document describing the state of the first component. Since the first component is atomic, this will effectively create a master-slave relationship between the two components. - As further illustrated in
FIG. 18 , a decision operation handler is called atblock 1812 to perform the evaluation defined in thedecision operation 606. In this regard, parameters are passed in the call to the decision operation handler that may include a temporary XBind if the operation involves an atomic component. In one embodiment, developers are able to create operations in accordance with the operations API that define function call parameters and the XML semantic structure that may exist within the body of the operation. In thedecision operation 620, elements are defined that allow the flow of program execution to be directed based on the result of an evaluated XPath expression. In this example, a string comparison is performed within the decision operation handler to determine whether text was entered into the Input4 component. Accordingly, the XPath expression (e.g., “text( )”) is evaluated within the decision operation handler into text. In instances when the expression being evaluated references data from an atomic component, the temporary XBind that is translated in order to evaluate a particular expression is used to obtain the requested data. Specifically, the XBind passed to the decision operation handler may include a reference to the system-provided state document where state data previously extracted from the Input4 component is accessible. - Then, at
block 1814, a call to execute the appropriate process step in the application is generated. The result of the evaluation performed within the decision operation handler determines whether to direct the flow of execution to eitherprocess step - As mentioned previously, the
decision operation 620 causes the flow of execution to proceed to processstep 610 if text was not entered in the Input4 component upon the occurrence of thetrigger 602. The only operation in theprocess step 610 is theaction operation 628 which will cause a button component to be displayed. In this regard, theaction operation 628 may be executed using the action operation handler described above with reference toFIGS. 15A-B . Accordingly, additional description of the functionality implemented when program flow is directed to processstep 610 will not be described in further detail here. - When text is entered in the Input4 component upon the occurrence of the
trigger 602, execution of the MyTasks application proceeds to theprocess step 608. The operation defined within theprocess step 608 is a change operation 624 that will cause text input into a component to be added to an XML document. In this regard, an exemplary change handling routine 1900 that implements the data update using a change operation handler will be described with reference toFIG. 19 . - As illustrated in
FIG. 19 , the change handling routine 1900 begins atblock 1902 where an expression evaluation is performed. Specifically, the “data/tasks.xml” expression in the value attribute of the change operation 624 is evaluated into an XBind atblock 1902. In this example, the XBind that results from the evaluation will consist of a URL and base path that references the root node of the “data/tasks.xml” document. - As the description above illustrates, an expression in the value attribute of an operation is evaluated into an XBind for each operation in an application. In one embodiment, expressions within the body of an operation may be evaluated within the logic implemented by an operator handler. Alternatively, expressions within the body of an operation may be evaluated before the appropriate operation handler is called. While both embodiments are supported, evaluation of expressions within the body of an operation in the logic of an operation handler is preferred since it is more efficient. In this regard, the change operation 624 includes the following “<store>” XML element 626:
-
- <store type=“append” select=“/tasks/task/@description” value=“{#MyTasks#input4}”
The “{#MyTasks#input4}” expression within thestore element 626 is evaluated into text atblock 1904. As mentioned previously, the expression engine provided by the present invention allows developers to delimit expressions for evaluation using the curly bracket notation. These expressions may be defined in attributes, between elements, and other locations in application code. In this example, logic within the expression engine causes the “{#MyTasks#input4}” expression to be evaluated into text.
- <store type=“append” select=“/tasks/task/@description” value=“{#MyTasks#input4}”
- In general, the change operation implemented by the present invention provides developers with a raw data manipulation tool for performing all the necessary modifications to the contents of an XML document. In this regard, a plurality of data manipulation primitives are provided that are in essence consistent with the World Wide Web Consortium's DOM standard. Moreover, aspects of the invention provide additional data manipulation primitives that include the replaceText and delete children primitives. Accordingly, the following exemplary primitives may be performed to modify the contents of an XML document using the change operation provided by the present invention: replace, replaceText, append, prepend, insert, remove, remove children, new, and delete. Those skilled in the art and others will recognize that these supplied primitives may be used and combined to perform all of the necessary modifications to the data model. As described in further detail below, any change operation affecting the data model will cause a transaction to be created within the
transaction manager 910, that describes the exact update that will be made. - At
block 1906 of the change handling routine 1900, the change operation handler is called by the appropriate process object. Whenblock 1906 is reached, the process object executing the current process is able to pass the previously evaluated XBind as well as the appropriate instance and process objects to the change operation handler. As described in further detail below, the change operation handler utilizes the received arguments to modify the contents of an XML document. - At
decision block 1908 of the change handling routine 1900, a determination is made regarding whether the change operation being executed defines a data transform. The value attribute defined in the change operation 624 identifies the document that is the subject of the change operation (e.g., “data/tasks.xml”). Within thestore element 626, the select attribute may contain an XPath expression (e.g., tasks/task/@description) referencing a location within the specified XML document where the data modification will be performed. Moreover, the select attribute may include an expression (e.g., “{#MyTasks#input4}”) that evaluates content that will be appended, replaced, or included in the XML document. In one embodiment, aspects of the present invention allow data to be transformed within the change operation before being appended, replaced, or added to the data model. For example, thestore element 626 could include a transform attribute that references an XSLT (Extensible Stylesheet Language Transformation) for performing a particular data transform. When this type of data transform is defined, the result of the test performed atblock 1908 is “yes” and the routine 1900 proceeds to block 1910. However, the change operation 624 in the exemplary MyTasks application does not include a transform attribute. In this instance, the result of the test performed atblock 1908 would be “no,” and the routine 1900 would proceed to block 1912, described in further detail below. - At
block 1910, a data transform is applied based on logic defined within a change operation. In an actual embodiment, the store element in a change operation may include a transform attribute that references an XSLT document. Logic within the XSLT document may be applied to transform data from a source format into a destination format atblock 1910. Traditionally, XSLT has been used to transform data to support the dynamic creation and modifications of Web pages. In addition, XSLT is also used to transform between XML business format languages and their corresponding structures as part of Electronic Data Interchange (EDI) integration servers. However, these examples are merely exemplary and XSLT is utilized in other instances. Moreover, other transform languages could be used in conjunction with the present invention and the use of XSLT should not be construed as limiting. In any event, those skilled in the art and others will recognize that XSLT is an XML-based language for defining transforms between various markup languages (XML, HTML, XHTML, etc.) as well as between XML schemas and XML documents implementing different XML schemas or DTDs (Document Type Definition). In this regard, an XSLT processor may be used by the change operation handler to apply the data transform, atblock 1910. By supporting the dynamic application of transforms in this way, an enhanced development platform is provided in which applications are better equipped to exchange data, interact, and integrate/re-use functionality. - A computer user will typically employ multiple applications such as e-mail, Web browsers, calendar applications, word processors, media players, and the like. However, the data formats and logic used by different applications are seldom compatible using existing systems. For example, an e-mail program may allow users to define a “contact” that is used to store and access information related to another user. On the other hand, a calendaring application allows users to create and track meetings and appointments involving other users, groups, etc. In response to reviewing a message from a contact defined in the e-mail program, a user may want to automatically create a new meeting in the calendaring application. However, supporting functionality that allows different applications to interact in this way is not readily performed using existing systems.
- The data transform applied at
block 1910 occurs before the raw data manipulation of the change operation is performed. By supporting this type of dynamic application of data transforms, aspects of the present invention provide application developers better opportunities to leverage functionality and data available from other applications. In the example provided above, a data transform may be performed that readily allows an e-mail and calendaring application to interact. For example, an XSLT transform may be defined for converting a received e-mail and/or contact into a data item describing a new appointment. In this regard, the transform may utilize the contact information, the content of an e-mail message, and/or input from the user to establish the attributes of the meeting. Within the change operation, this type of XSLT transform may be applied that allows different applications to communicate even though different underlying schemas and XML structures are used. - At
block 1912 of the change handling routine 1900, a call to perform the specific data update represented in the change operation is made to the appropriate URL object. As described in further detail below, a URL object provided by the present invention serves as a lightweight pointer that exposes methods for performing each of the different types of data modification primitives (described above) that are supported by the change operation handler. Accordingly, the change operation handler utilizes the received XBind and logic within thechange operation 626 to identify the appropriate URL object to call. It should be well understood that the utilization of a URL object is merely implemented to obstruct the details of interaction with documents and the invention could readily be implemented in other ways. Once the call to the URL object is made, flow of execution proceeds to the data update routine 2000 described below with reference toFIG. 20 . Then, the change handling routine 1900 proceeds to block 1914, where it terminates. - Now with reference to
FIGS. 20A-C , adata update routine 2000 and the interaction between objects used by the routine 2000 will be described. The data update routine 2000 depicted inFIG. 20 illustrates two instances beginning atblocks data update routine 2000 begins atblock 2002, a URL object receives a call to perform a data update within the context of achange operation handler 1250. As described above, an application may include a change operation for modifying the contents of an XML document. Accordingly, the change handling routine 1900 (FIG. 19 ) may generate a call to perform a data update on the specifiedURL object 1253 that is received atblock 2002. - When the routine 2000 begins at
block 2004, a call to perform a data update on the specifiedURL object 1253 originates from a user interface component. When a binding is defined, a component becomes aware of the URL and XML document associated with the binding. For example, the Input3 component in the MyTasks application would receive a URL object corresponding to the “data/tasks.xml” document when theBind operation 616 is executed. As described in further detail below and in accordance with one embodiment, a Web browser that utilizes the HTML DOM may be employed to render a user interface. In this embodiment, component objects created in the context of a corresponding view object cause various event listeners to be registered on the HTML DOM utilized by the Web browser. A component may listen for events affecting the HTML DOM that occur when, for example, a user provides input or otherwise interacts with the user interface displayed by the Web Browser. With specific reference toFIG. 20B , thecomponent 1252 interprets the received data and generates a call to itsURL object 1253 to cause a data update event to be implemented. For example, when the “Update Presentation” task is deleted in the exemplary MyTasks application, a URL object that corresponds to the “data/tasks.xml” document is created and called to delete the task description from the data model. As described in further detail below, theURL object 1253 will then communicate the data update to thetransaction manager 910. In turn, thetransaction manager 910 will propagate the data update to the underlying XML document object that actually causes the data update to be implemented. In addition to implementing the data update, thedocument object 1254 will cause the data update to be propagated to all the appropriate listening data update objects. These listening objects are frequently components but may be other types of objects. An XML document may be shared across remote computers that listen for changes that occur to the XML document object. However, the data update to thelocal document object 1254 maintained in client-side cache is implemented before the data update is propagated to any remote listeners. In other words, the full network update is performed subsequent to the data update being implemented locally. - At
block 2006 of thedata update routine 2000, theURL object 1253 corresponding to thedocument object 1254 that will be updated causes a new transaction to be generated. In this regard, thetransaction manager 910 is called, atblock 2006, which creates a new “transaction” or XML fragment that represents a relative change to an XML document. In one embodiment, thetransaction manager 910 includes information in the XML fragment for both implementing and reversing the relative change. Moreover, regardless of whether the data update originates from the context of a component or the change operation handler, an XBind serialized into XML is included with the transaction created atblock 2006. As described in further detail below, thetransaction manager 910 causes the data update to be implemented both locally and propagated to any remote listeners. In either instance, an XBind is supplied that identifies the location in the data model where the data update will be performed and XML formatted data that contains logic for reverting the requested data manipulation operation, referred to herein as performing a “rollback.” - At
block 2008, thetransaction manager 910 causes the data update to be implemented locally. A transaction may represent a session that consists of multiple and potentially different types of modifications to the data model. Accordingly, in a data notification event, one or more update event objects are created that represent a unit in which modifications to the data model are described. On the other hand, a transaction fully describes one or more changes being made to the data model and logic for reverting these changes. Moreover, in addition to sending out data notification events, document objects provide methods for modifying the actual contents of an underlying XML document as represented in update event objects. Specifically, each data manipulation primitive that may be performed on an XML document (replace, append, prepend, insert, etc.) is implemented in corresponding methods provided by theURL object 1253, thetransaction manager 910, and thedocument object 1254. - As further illustrated in
FIG. 20 atblock 2012, thetransaction manager 910 calls thecommunication manager 1256 to propagate the transaction to any remote listeners. In this regard, thecommunication manager 1256 allows applications to instantiate channels that abstract communications with remote network services. Based on the received XBind, thecommunication manager 1256 will identify the appropriate communication channel for transmitting the transaction over the network, if any. As described in further detail below, communication channels operate under different protocols as defined by the URL standard. For example, the appropriate communication channel may be identified in the protocol identified in the URL such as “http://,” “xios://,” or “database://.” Using logic obtained according to communicator APIs, the data received from thetransaction manager 910 is translated into a format understood by a remote network service. In this regard, systems and methods for performing network communications using communication channels will be described in further detail below. Significantly, logic for notifying and updating local data listeners is performed before, and independently from, a corresponding transaction being transmitted over the network. In one embodiment, the present invention is configured to propagate transactions over the network asynchronously. As a result, execution of application logic locally is not hindered by network latency or other delays that are inherent in network communications. Then, once the transaction is provided to the appropriate channel, the data update routine 2000 proceeds to block 2014, where it terminates. - Now with reference to
FIG. 20C , an exemplary networking environment suitable for illustrating how transactions are propagated between remote clients will be described. As mentioned previously, thetransaction manager 910 causes transactions or data fragments that represent a relative change to documents stored locally to be propagated to any remote listeners. In the example depicted inFIG. 20C , transactions originating withclients XML file system 2084 maintained at a server-side data center. Specifically, each of theclients document 2093. Any data updates to the document objects 2094 or 2096 performed locally in the client-side cache 2098 are identified and propagated to theXML file system 2084 so that theclients - Now with reference to
FIG. 21 , an additional description regarding how rules are applied to provide more-intelligent components will be described. When bound to data, any rules associated with a component are applied and allocated a unique namespace in the data model. Generally described, rules allow generic components to interpret, learn, and take appropriate action depending on the content in the data model. In other words, a rule using component does not need to be created for specific data models. In this regard, the bind handling routine 1600 described above (FIG. 16 ) may determine that a particular component utilizes rules. In this instance, theset rule routine 2100 described with reference toFIG. 21 may be called to apply and merge rules associated with the data binding of a new component. In one embodiment, the unique XML namespace of a component's rules are merged into the data model and readily available to the components that are bound to the data model. In an alternative embodiment, the rules associated with the component may be stored remotely and accessible through Web services or additional XML documents. - As illustrated in
FIG. 21 , theset rule routine 2100 begins atblock 2102, and atdecision block 2104, a determination is made regarding whether a rule handler for the appropriate document is defined. In this regard, rule handlers allow rules associated with different components to be executed relative to the same data. Each rule-using component bound to an XML document will provide logic (e.g., “rules”) to a corresponding rule handler maintained in the data model. Accordingly, if a component that utilizes rules was previously bound to the relevant document, then a corresponding rule handler will exist, and the routine 2100 proceeds to block 2108, described in further detail below. In this regard, if multiple rule-using components are bound to the same document, the same rule handler is used for all of these components. Conversely, if a rule-using component was not previously bound to the relevant document, then the routine 2100 proceeds to block 2106. As further illustrated inFIG. 21 atblock 2106, a new rule handler is created for holding the rules of each component bound to the same underlying data. - As mentioned previously, a set of generic components of the type used by modern graphically-based applications is provided. By defining rules, generic components provided by the present invention do not need to understand anything about the underlying data model. In this regard,
FIG. 8A illustrates atree component 800 that visually depicts the hierarchy of folders in a file system and includes folder names, icons, and the like. Rules may be defined that provide logic for populating a generic tree component with content that is maintained in the data model. For example, aspects of the present invention may describe the contents of a file system in a folders.xml document in which each element in the document represents a different folder. Data associated with particular folders such as an identifier, icon, and the like may be identified according to attributes within a folder element. By way of example only, the following rules may be defined to interpret content in the folders.xml document for display in thetree component 800 depicted inFIG. 8A . -
<tree name = “folder tree”> <rule match=“folder” display=“@id”/> <rule match=“folder [@id =‘email’]” display=“@id” icon= “icons/mailicon.png”/> </tree>
In this regard, the first rule element with the match attribute of “folder” and the display attribute of “@id” would cause the contents of the “id” attribute in the folders.xml document to be displayed as the folder name. Accordingly, the names allocated to folders in thetree component 800 depicted inFIG. 8A may be defined utilizing a rule. The second rule element with the match attribute of “folder [@id=‘email’]” would cause the folder that has the name attribute of “email” to be allocated a particular icon associated with e-mail messages, as depicted inFIG. 8A . It should be well understood that the rules provided above are merely exemplary and only include a subset of the logic that would actually be used to populate the content of thetree component 800. In the event that the structure of the folders.xml document is modified, a component's rules may be readily updated to account for the change. Moreover, rule-using components will be notified of the changes in the same way as other data updates. Specifically, an event update object may be created and used to notify the component of the changes utilizing the notify listeners routine 2200 of the data update event notification bus described in further detail below. - With reference again to
FIG. 21 , the rules of the component being bound to the data model are applied atblock 2108. Once a rule handler is created, a component that is the subject of the bind operation provides its rules to the appropriate rule handler. In this regard, a rule handler serves as an extension to the data model and manages the rules of different data binding components that are bound to the same document. In one embodiment, namespaces may be allocated in the data model that separate the vocabularies of different rule using components or objects. By allocating and managing component rules utilizing namespaces, the rule handler is able to execute all component rules in a way that prevents collisions within the data model. - In applying new rules at
block 2108, the rule handler is invoked and causes the rules of each component bound to the relevant document to be executed. In other words, the rules associated with potentially multiple data binding components are executed relative to the current version of the data model. Then, once all of the rules have been executed, the component that is the subject of the bind operation is made aware of its corresponding assigned namespace by the rule handler. Specifically, the rule handler passes a reference to the component associated with the new data binding that identifies the namespace in the data model allocated to the components' rules. - At
block 2110 of theset rule routine 2100, rules associated with a component that is the subject of the bind operation are merged with the rules of other components. Developers may define the semantic logic of a component's rules utilizing the XML-based languages provided by the present invention. By way of example, a rule may include XPath expressions, UI XML logic references, elements that describe other components, variables, aliases and other references to data outside the container of a rule namespace. In this regard, data bindings of different components may have transitive relationships by virtue of their associated application and rule logic. Accordingly, the rules of different components working on the same underlying data are also maintained in the data model. Once a component is made aware of its namespace, a call is generated to set new data on the component. In this case, the call to set new data on the component will cause the semantic logic of a component's rules to be included in the data model in a namespace that is separate from the rules associated with other components. - At
block 2112, a call is generated that causes a data update as reflected in the data model to be propagated to any data update listeners. As mentioned previously, document objects maintain a list of listeners that are notified in response to a data update. When new rules are added to the data model, as occurs atblock 2110, the corresponding listeners will be notified of the data update. In this regard, the logic for notifying listeners of an update is described in further detail below with reference toFIG. 22 . Then, theset rule routine 2100 proceeds to block 2114, where it terminates. - In the examples above, bindings were defined that caused a component to automatically display content maintained in the data model. By using bindings in this way, developers are freed from having to provide logic in application code for setting and updating data on user interface components. However, the examples above are highly simplified and only reflect one exemplary aspect of the present invention. In this regard, bindings and their corresponding XBinds enable the implementation of more sophisticated functionality.
- In one embodiment, the present invention provides a standardized means for objects to describe, store, and communicate their current state. By way of example,
FIG. 8A illustrates atree component 800 that allows a user to navigate and select folders from a file system. A user selection may be described in an XBind, which provides a standardized variable format in the network operating system environment. In the example depicted inFIG. 8A , the user made a series of selections to navigate to the folder entitled “video_encoding.” The state of thetree component 800 with regard to the selection of this particular folder may be described in the following XBind: - URL: folders.xml
- XPath: /
- Selection: /folders/research/work/video_encoding/
- The example provided above is simplified and used for illustrative purposes only. In an actual embodiment, the XBind that describe the state of the
tree component 800 would actually be: - URL: folders.xml
- XPath: /
- Selection: /fs:folder/fs:folder[@name=‘research’]/fs:folder[@name=‘work’]/fs:folder[@name=‘videoencoding]
- All of the XBinds described herein may be used to reference data regardless of where the data is stored. Accordingly if the underlying data was maintained at a network location, the above selection could be described in the following XBind:
- URL: http://www.networkdomain.com.folders.xml
- Base path: /
- Selection: /folders/research/work/video_encoding/
- In any event, other objects will frequently use an XBind describing a user selection as the basis for performing actions or otherwise implementing application functionality. As illustrated in
FIG. 8B , thelist component 850 displays file system data that may be based on a user selection made from thetree component 800. For example, thelist component 850 could be configured to display documents (e.g., “whitepaper.txt,” “testresults.xml,” and “blog.html”) based on the folder selected in thetree component 800. The XBind describing the selection is output to the shared data model by thetree component 800. In turn, this XBind may be provided as input into other listening objects (e.g., the list component 850). Accordingly, the input provided to one object (i.e., the list component 850) is interleaved with output previously persisted to the data model from a different object (i.e., the tree component 800). The implementation of an XBind provides a generic variable format that enables this interleaving of I/O in which values accessed from the data model depend on the values of previous I/O. In this regard, the internal computational logic of objects that implement the XML virtual machine is decoupled from their interactions with other objects and systems. In one aspect, XBinds provide a standardized variable format that is used to model interactions and allow this decoupling. XBinds provided by the present invention does not contain values to requested data. Instead, XBinds reference locations where data can be obtained thereby allowing different objects and systems to work with the same underlying data. In addition, XBinds may also be transformed, merged, serialized for use an XML-based system. As the description herein illustrates, XBinds serve as a carrier of object state information utilizing the selection aspect of the XBind. Significantly, since XBinds reference locations where object state information may be obtained, the state information is communicated without altering or changing any of the referenced information or objects. - As a user navigates the file system, the
tree component 800 may utilize all dimensions of an XBind to describe a selection. For example, if the user were to select both the “whitepaper.txt” and “testresults.xml” documents in thetree component 800, the selection may be described in the following XBind. - URL: folders.xml
- Base path: /folders/research/work/video_encoding/
- Selection:/folders/research/work/video_encoding/document[@name=‘testresults.xml’]
-
- /folders/research/work/video_encoding//document[@name=‘whitepaper.txt’]
Again, the example above is used for illustrative purposes and does not represent an actual embodiment of the present invention. The URL of this XBind references the underlying XML document describing the file system, and the base path limits the binding to the “video_encoding” folder. Moreover, the selection of this XBind includes an array of XPath expressions that identify each document selected by the user. Similar to the description provided above, this XBind may serve as the basis for other objects to perform actions. By way of example, a user could generate an event to delete the selected documents. The above XBind that describes the selection state of thetree component 800 would be provided as input into systems that implement the file deletion.
- /folders/research/work/video_encoding//document[@name=‘whitepaper.txt’]
- As indicated previously, components and other objects may be notified in response to changes in the data model. Aspects of the present invention allow components to register as listeners for data updates performed on a particular document. When a data update occurs, each listener registered with the document object is notified of the data update and may update their user interface accordingly. Now with reference to
FIG. 22 , a notify listeners routine 2200 that propagates data updates to listening components will be described. While the notify listeners routine 2200 is described with reference to listening component objects, this is merely exemplary as other objects may be data update listeners. - As illustrated in
FIG. 22 , the notify listeners routine 2200 begins atblock 2202 where a data update is performed on an XML document. As the examples above illustrate, data updates to the data model may be performed in different circumstances. When interacting with a data binding component, a user may generate input that is automatically persisted to the data model by the component. On the other hand, a data update may be performed as a result of executing application logic defined in a change operation. Moreover, objects that implement the XML virtual machine perform data updates when using the shared data model and bindings as a communication interface. For example, the semantic description of a component's rules are persisted to the data model which allows different components to interpret the same underlying data. - At
decision block 2204, a determination is made regarding whether the data update was performed on a document with a corresponding rule handler. If a rule handler is not defined because a rule-using component was not previously bound to the document, the result of the test performed atblock 2204 is “no” and the notify listeners routine 2200 proceeds to block 2208, described in further detail below. Conversely, if the relevant document has a corresponding rule handler, the notify listeners routine 2200 proceeds to block 2206. - At
block 2206, the rule handler associated with the document that experienced a data update is invoked. By invoking the rule handler, logic is implemented to ensure that the rule namespace as understood by each data binding component is current and to preserve the integrity of the data model. In this regard, the data update performed atblock 2002 may involve adding or otherwise modifying the logic in the rule handler. For example, when a new data binding is defined, the set rule routine 2100 (FIG. 21 ) causes the rules of a new component associated with the data binding to be merged in the data model with the rules of other components. Any listening component bound to the same underlying document is notified within the notify listeners routine 2200 about the data update to the rule handler. - In the
set rule routine 2100 described above (FIG. 21 ), the rule handler causes all rules as reflected in the current version of the data model to be executed. Then, the component associated with the new data binding is provided with current namespace information regarding the component's corresponding rules in the data model. However, since the addition of new rules may affect the bindings of other rule-using components, an update notification is also provided to these rule-using components. Accordingly, when invoked atblock 2206, the rule handler causes all of the rules as reflected in the current version of the data model to be executed. As a result, the rule handler is able to provide current namespace information and up-to-date rules to any listening component that is a rule user. In turn, this new data is set on the component, thereby causing the data update of the new rules to be reflected in the listening component's data binding. - Once the rule handler completes, the “Update( )” method associated with a listening component is called at
block 2208. Since components are defined in accordance with a set of component APIs, the logic performed within the “Updated” method is configurable. In other words, each component will not implement the same logic within its “Updated” method. Instead, developers may adopt this logic and create new components that effectively extend the capabilities of the XML virtual machine. Accordingly, the description provided below is made with reference to components provided by the present invention and is merely representative of the logic that may be implemented within the “Updated” method. - At
decision block 2210, a determination is made regarding whether an initial data update was performed atblock 2202. In one embodiment, data updates are directed through thetransaction manager 910. One or more event update objects that represent an atomic unit for implementing the data update may be created and subsequently supplied in the call to the listening component's “Updated” method (received at block 2208). In one embodiment, if an event update object is received in the call to the “Updated” method, the data update is not an initial update, and the notify listeners routine 2200 proceeds to block 2214, described in further detail below. If an event update object is not received in the call to the “Updated” method, then the routine 2200 determines that an initial data update is being performed and proceeds to block 2212. - At
block 2212, the user interface of the component is visually rendered using a complete representation of the underlying data bound to the component. Ifblock 2212 is reached, an initial data update is being performed, and all of the data set on the component should be reflected in the component's user interface. In this regard, a routine that causes XML formatted data to be rendered in a component's user interface is described in further detail below with reference toFIG. 23 . However, it should be well understood that how the rendering is performed is at the discretion of the developer and not dictated by the component APIs. As described in further detail below, rendering may be performed using various technologies including, but not limited to, XSLT, JavaScript, HTML, VML/SVG or Adobe™ Flash. - As mentioned previously, one or more event update objects may be provided when a listening component's “Updated” method is called. As illustrated in
FIG. 22 , a received event update object that represents an atomic unit of describing a data update is selected for processing atblock 2212. In one embodiment, logic is implemented that causes the data update, as represented in one or more event update objects, to be reflected in a listening component's user interface. - At
decision block 2214, a determination is made regarding whether the selected event update object represents a data update that affects the listening component. As described previously, the component or operation where the data update originated supplies an XBind that references the location in the data model affected by the data update. This variable that describes the change being performed to the data model is included in the event update objects that are propagated to each listening component. In this regard, an XBind is also used to describe the binding of data to a listening component's user interface. In one embodiment, the XBind describing the data binding of the listening component may be compared to the supplied XBind describing the data update. Utilization of a common variable format (e.g., XBind) allows a listening component to perform a comparison and determine whether the user interface of the component is affected by the data update. If the results of this comparison indicates that the listening component is not affected by the data update, then the notify listeners routine 2200 proceeds to block 2222, described in further detail below. Conversely, if the data binding of the listening component's user interface is affected by the data update, then the notify listeners routine 2200 proceeds to block 2216. - In one aspect, the present invention supports partial updates to the visual display of a component's user interface. At
decision block 2216, a determination is made regarding whether a partial update may be performed by a listening component. In this regard, if logic is provided within the listening component's “Updated” method that supports partial updates, then the notify listeners routine 2200 proceeds to block 2220, described in further detail below. Conversely, if the listening component does not support partial updates, then the notify listeners routine 2200 proceeds to block 2218, where the “Updated” method causes the component's user interface to be rendered based on all of the data reflected in the components data binding. In this regard, a routine that causes XML formatted to be rendered on a component's user interface is described in further detail below with reference toFIG. 23 . - At
block 2220 of the notify listeners routine 2200, a partial update to a component's user interface is performed. When partial updates are supported, only the data in the components data binding that is affected by the data update is utilized to perform the partial update. Using the supplied XBind this data may be identified and set on the component, atblock 2220. The “Updated” method of the component causes the component's user interface to be rendered based on the partial update now reflected in the components data binding. - At
decision block 2222, a determination is made regarding whether any additional updates will be reflected in the component's user interface. Accordingly, if any event objects received in the call to the “Updated” method have not been previously selected, the routine 2200 proceeds back toblock 2212, and blocks 2212-2220 repeat until each event update object has been selected and processed. Then, once all of the changes represented in the data update are reflected in the components' user interface, the routine 2200 proceeds to block 2224, where it terminates. - As mentioned previously with reference to
FIGS. 4A-B , the network operating system may be implemented on a client computer within the context of a Web browser, as a stand-alone application or as a machine operating system. In this regard, arendering routine 2300 will be described with reference toFIG. 23 that performs processing to graphically render and initialize the components and dialogs of an application. While specific reference is made below to specific Web browser technologies, it should be well understood that the present invention may be implemented without utilizing a Web browser. Moreover, in alternative embodiments, therendering routine 2300 may be implemented differently to account for browser-specific variations. Accordingly, the description provided below with reference toFIG. 23 is merely exemplary and may be performed differently on various platforms. - As illustrated in
FIG. 23 , therendering routine 2300 begins atblock 2302, where a view object is instantiated and called to render a new application view. As mentioned previously, the data type recognizer provided by the present invention may cause a new view object to be instantiated when an UI XML document is opened. Then, the view object generates a request to obtain a new dialog object atblock 2304. Generally described, a dialog serves as a frame for an application's components and includes controls for minimizing, expanding, and manipulating the visual representation of an application's view. In one embodiment, a dialog manager is provided that is configured to recycle dialog objects, thereby reducing the amount of memory consumed. Accordingly, if a previously created dialog object is no longer being utilized but still maintained in memory, then an existing dialog object will be reassigned to the new application view. - At
block 2306 of therendering routine 2300, the view object is registered as a listener on a corresponding view.xml document. Similar to user interface components, a view object may register as a listener for data updates performed to the data model that describes the view. As described in further detail below, the view.xml document in which the view object registers as a listener will be updated when specified events that originate from the Web browser occur. Typically, the events will be user generated when input is provided or a user otherwise interacts with the system. - At
block 2308 of therendering routine 2300, an XML-based description of an application's user interface is transformed or converted into an HTML-based representation. As mentioned previously, the present invention allows developers to semantically describe the visual representation of an application's view using the UI XML programming language. In this regard, the UI XML programming language does not have developers provide any computational or scripting logic. Instead, only abstract descriptions of graphical elements and their relations are provided in an application's UI XML document. In instances when a Web browser is utilized, an XSLT may be defined for transforming UI XML logic into HTML or other markup formats suitable for rendering by a Web browser. Significantly, when the UI XML logic is transformed atblock 2308, unique identifiers associated with an application's components are included in the resulting HTML DOM document that is rendered by the Web browser. Once the transformation is performed, a Web browser will cause the graphical elements associated with an application's view to be rendered. - At
block 2310, an object that contains the computational logic of a component is instantiated and associated with a corresponding view object. In one embodiment, the UI XML document that describes an application user interface logic is traversed. Each component represented in the UI XML document is selected and a corresponding component object is instantiated. In one embodiment, the present invention provides a separation between the computational logic of a component and its graphical representation. In other words, the UI XML description of the component's visual representation does not include any computational logic and may be transformed in various ways and for different platforms without impacting the component's behavior. In this regard, the component object instantiated atblock 2310 encodes the component's computational logic, which may be represented in a scripting programming language such as JavaScript, SilverLight, or Adobe™ Flash. However, developers do not define the component's behavior using the scripting language. Instead, developers define the desired behavior of the component using the UI XML language. If new components are needed, developers may create the new component in accordance with the component APIs. In this regard, each component object implements certain methods that are based on information received in accordance with the component APIs. These methods include an “Initialize( )” method for setting data on the component and an “Update( )” method for performing updates to the component's user interface. Numerous methods not discussed herein may be implemented by within components such as an “Unload( )” for removing the component when an application view is closed. However, so long as a basic methods defined by the component APIs exist, a components can be implemented using any available rendering technology. In other words, components are not required to render their user interface using XSLT to HTML, even though that is the embodiment principally described herein. Also, the rendering logic can be described with the component using traditional programming logic. - At
block 2312, the computational behavior of the component object instantiated atblock 2310 is initialized. When the UI XML logic of the application's view is transformed, identifiers associated one or more components are included in the resulting HTML DOM document rendered by the Web browser. In initializing a component's behavior atblock 2312, the appropriate references related to the component in the HTML DOM are identified by the view object using its view.xml document. By interpreting the view.xml document, the view object is able to instantiate the component objects corresponding to the generated HTML DOM and connect each component object to a corresponding user interface. In this way, a component's computational behavior and logic is invoked on the component's user interface. Once a component has been associated with its respective user interface, the default states and/or values of the component are set in accordance with the “Initialize( )” method implemented in each component utilizing the component APIs. When all the components represented in an application's UI XML document have been initialized, therendering routine 2300 proceeds to block 2314, where it terminates. - Generally described, the functionality performed by the
rendering routine 2300 allows a view object to facilitate communications between XML-based applications and the HTML DOM utilized by a Web browser. In response to the occurrence of an event in the Web browser, the affected component and the view object may be notified and, after processing, propagate the event to the appropriate event listeners (e.g., triggers in a process XML document or event listening objects). Once a binding is defined, the graphical representation of a component in the Web browser may be changed when a components corresponding “Updated” method is called, in a full or partial update, as described above. - Significantly, the component APIs only require a component to implement a basic set of computational logic. As a result, components may readily be configured to use rendering technologies other than HTML and still be aware of data updates and able to bind to data. In alternative embodiments, components may be initialized and rendered using Adobe® Flash, Microsoft® SilverLight, Java® Applet, or any other rendering technology capable of being called within the computational logic of the XML virtual machine that executes each client-side components computational logic. Moreover, the
rendering routine 2300 described above may be performed in different ways when implementing the present invention on different types of computing devices. When a Web browser is not utilized, the user interface logic of an application may be rendered without performing a transform between XML and HTML atblock 2308. Instead, graphical primitives may be provided that are suitable for being implemented and called to render a component's user interface within the “Initialize( )” and/or “Updated” methods and built using traditional programming language like C, C++, Java or Microsoft® SilverLight. - XIOS Communication Overview
- XIOS applications, which are written for the network operating system, use the model-view-controller (MVC) model. To this end, XIOS applications interact primarily with a data model, which is an abstraction of the contents of a data source. This layer of abstraction between a XIOS application and the data source allows the XIOS application to be insulated from changes made in the data source. In other words, changes in the data source do not necessarily require changes in the XIOS application.
-
FIG. 24 illustrates an overview of one embodiment of howXIOS applications 2402 interact with a variety of exemplary data sources within this framework. In MVC terms, theXIOS applications 2402 interact primarily with a data model. In one embodiment of this architecture, theXIOS applications 2402 interact with data models for a variety of data sources by interacting with XML documents that represent a data model of each data source. In another embodiment,XIOS applications 2402 interact directly with a programming object exposing the data model as described above. The description below primarily relates to an embodiment in whichXIOS applications 2402 interact with XML documents, but one skilled in the art will recognize that other implementations of the MVC paradigm may be substituted. - The communication with a given data source is handled by the
communication manager 2412, which may be embedded in the system context object 902 (FIG. 9 ) at runtime. Thecommunication manager 2412 manages a set of communicator instances, each of which implements acommunicator API 2410. Thecommunicator API 2410 exposes generic operations applicable to any given data source. For example, thecommunicator API 2410 allows aXIOS application 2402 to load, modify, create, or delete a document that represents connecting to a data source, modifying data stored in the data source, creating new data in the data source, query or removing data from the data source, and the like. - The
communicator API 2410 is built around the idea that any data source can be accessed using just a URL. A communicator implementing thecommunicator API 2410 enables access to its data via URLs, and returns XML documents that theXIOS applications 2402 can manipulate as a data model. Using this simple methodology, aXIOS application 2402 using the returned XML document does not require any knowledge of a channel from which the document arrived, or the kind of underlying data source from which it is created. Having a unified way of using, manipulating, and creating data simplifies application development and implementation of the data abstraction solution.XIOS applications 2402 may also easily change from one data source to another and/or transform a data source. - The
communication manager 2412 instantiates a given communicator, thereby creating a channel, in response to receiving a request for a URL from aXIOS application 2402. The name or type of the channel is provided as a URL protocol, and the rest of the URL provides information to the channel. The channel then handles the information in a channel-specific manner. For example, a web search channel may accept a URL such as “websearch://example+search+terms”. The protocol “websearch” can instruct thecommunication manager 2412 to pass the URL to the web search channel, and the location “example+search+terms” can be used by the web search channel to build a search query to be submitted to a web search engine. As an example of another channel, a message in an inbox of an IMAP folder store may be accessed in a similar way via an IMAP channel when passed a URL such as “imap://servername/user1/inbox/message1”. - In some cases, a simple URL will be passed to a function of the
communicator API 2410 as implemented by a particular communicator, such as a load function or a save function. In other cases, an action URL may be passed to a communicator. Action URLs may be used in a communicator when there is a need to provide additional functionality apart from standard data reading/editing/writing/appending operations provided by thecommunicator API 2410. The action URL can provide communicator-specific functions that use either the underlying data model, other resources, or the underlying data model along with other resources. One example could be an action URL that causes the communicator to perform complicated processing of an underlying data model, thus relieving the programmer from having to do this processing in program code. Another example could be offering functionality based on data or functions outside of the underlying data source. The format of an action URL is similar to that of any other URL passed to the communicator API 2410: “channel name://function(param1, param2, . . . param n),” where “channel name” determines the communicator to handle the action URL, “function” is used by the communicator to determine what processing to perform, and “param1,param 2, . . . param n” is a list of parameters to be passed to the function. In one embodiment, a request for an action URL returns an XML document. - Three examples of data model documents, communicators, and data sources are shown in
FIG. 24 . One example is adata model document 2404 andcommunicator 2414 used for communicating with aweb search service 2426, such as Google, Yahoo!, MSN Live Search, and the like. AXIOS application 2402 requests from the document manager 912 a websearch model document 2404, which abstracts the communication with theweb search service 2426. Thedocument manager 912 uses thecommunicator API 2410 to communicate with theweb search communicator 2414 as theXIOS application 2402 interacts with the websearch model document 2404. In turn, theweb search communicator 2414 translates requests submitted through thecommunicator API 2410 into a format understood by a SOAP interface 2420 that exposes the functionality of theweb search service 2426. Thus, when aXIOS application 2402 requests a URL such as “websearch://example+search+terms” from thedocument manager 912, an XML document such as websearch model document 2404 is returned that represents the search results. - Another example shown in
FIG. 24 is anSQL model document 2406. As with the websearch model document 2404, theXIOS application 2402 manipulates anSQL model document 2406. Changes to this document cause thedocument manager 912 to make calls through thecommunicator API 2410 to anSQL communicator 2416. TheSQL communicator 2416 translates the calls from thecommunicator API 2410 into a format understood by anSQL web service 2422. TheSQL web service 2422 is a front end for anSQL API 2432, which allows access to anSQL database 2428. - As yet another example shown in
FIG. 24 ,XIOS applications 2402 may request a document such asIMAP model document 2408. As aXIOS application 2402 manipulates theIMAP model document 2408, thedocument manager 912 communicates with anIMAP communicator 2418 through thecommunicator API 2410. TheIMAP communicator 2418 translates requests from thecommunicator API 2410 to a format understood by an IMAP web service 2424. The IMAP web service 2424 is a front end for astandard IMAP interface 2434 on anIMAP server 2430. - Each communicator instance, such as
web search communicator 2414,SQL communicator 2416, andIMAP communicator 2418, is hosted by thecommunication manager 2412 of the client-side component 2400. Thecommunication manager 2412 is responsible for receiving requests from thedocument manager 912 that contain URLs, and for instantiating the necessary communicator to form a channel in response to each requests. For example, if thecommunication manager 2412 receives a request for a URL beginning with imap://, thecommunication manager 2412 will instantiate an IMAP communicator 2418 (if one is not currently instantiated) and pass the request to theIMAP communicator 2418. - As depicted in
FIG. 24 , each of the data sources—web service 2426,SQL database 2428, andIMAP server 2430—is accessible through a web-based front end, such as SOAP interface 2420,SQL web service 2422, and IMAP web service 2424. When the client-side component 2400 communicates only with data sources accessible through HTTP, the client-side component 2400 receives the benefit of being able to reuse much existing communication functionality, such as functionality contained in standard web browsers, proxy servers, firewalls, and the like. However, it may also be possible to create a communicator that would not require an HTTP-enabled data source as a back end. For example, with an appropriate communicator, the IMAP web service 2424 or theSQL web service 2422 could be removed, and theIMAP communicator 2418 and theSQL communicator 2416 could then communicate directly with theIMAP interface 2434 or theSQL API 2432, respectively. - XIOS File System—Server-Side Component
-
FIG. 25 illustrates an overview of one embodiment of the XML file system server-side component 2500. As inFIG. 24 , the client-side component 2400 comprises a data model, embodied in an XML-FS model document 2502, made available toXIOS applications 2402 by thedocument manager 912. Thedocument manager 912 communicates through thecommunicator API 2410 with aXIOS communicator 2504 hosted by thecommunication manager 2412 asXIOS applications 2402 interact with the XML-FS model document 2502. TheXIOS communicator 2504, in turn, communicates with the server-side component 2500. The server-side component 2500 comprisesclient interface components 2506 anddata storage components 2514. - The
client interface components 2506 are the primary components with which theXIOS communicator 2504 communicates. The XML web service 2510 (along with its web-based HTTP front end 2508) and thetransaction coordinator 2522 are the primary ways theXIOS communicator 2504 communicates with the server-side component 2500. TheXML web service 2510 exposes functionality within the XML file system such as file creation, file retrieval, file deletion, file search, and the like. Thetransaction coordinator 2522, which will be discussed in more detail below, helps to coordinate changes to files in thedata storage 2514 when more than one client is currently accessing the same file, and acts as a caching mechanism. Themessage server 2512, which will also be discussed in more detail below, is used to notify the client-side component 2400, via theXIOS communicator 2504, of changes in objects in theXML file system 2500 to which theXIOS communicator 2504 has subscribed. - As shown in the diagram, communication between the
XIOS communicator 2504 and theXML web service 2510 is bidirectional. In other words, theXIOS communicator 2504 both sends information to, and receives information from, theXML web service 2510. In contrast, themessage server 2512 primarily pushes information to theXIOS communicator 2504. - The
data storage components 2514 comprise afile server 2516, anindex server 2518, and afolder database 2520. In one embodiment, the XML file system stores file data in three separate parts. The raw data contained within the file is stored as a file on thefile server 2516. The filename, author, modification date, access control list (ACL), and other common file information associated with each file is stored within thefolder database 2520. Thefolder database 2520 also stores the folder hierarchy within which the files are organized, including ACLs for each folder and additional folder metadata such as related icons, folder rendering type (for example, indicating the folder contains pictures, and should therefore be rendered with picture thumbnails), and the like. Theindex server 2518 stores additional metadata used to identify and locate files, such as by searching the metadata using a full-text search. - While each of these components has been depicted as a separate component on a single server in
FIG. 25 , one skilled in the art will recognize that one or more of these components may be hosted on separate physical hardware. Alternatively, one or more of these components may be split into multiple components, be duplicated within a server-side component 2500, or have their functionality combined into a single component. For example, theXML web service 2510, themessage server 2512, thetransaction coordinator 2522, theindex server 2518, thefile server 2516, and thefolder database 2520 may all be hosted on the same physical machine. As another example, thefolder database 2520 may be separated from the rest of the components as a stand-alone SQL-based data store, or thefile server 2516 may be located on a specialized high-capacity file storage system. Also, the XML file system may include only one server-side component 2500, or may include many. - In one embodiment, the
XIOS communicator 2504 may always communicate with the same server-side component 2500. The server-side component 2500 will then use information contained within the URL requested by theXIOS communicator 2504 to determine the appropriateXML web service 2510,message server 2512, and so on to service the request. The server-side component 2500 contacted by theXIOS communicator 2504 may also forward the request to a more appropriate server-side component 2500 altogether. In this way, the client-side component 2400 is insulated from the complexity of any load balancing, redundancy, or scaling architecture implemented by the server-side component 2500. -
FIG. 26 illustrates one embodiment of some of the details of the content of themessage server 2512. Themessage server 2512 contains a subscription list for each client using the XML file system. For example,FIG. 26 illustrates two clients: client one 2606 and client two 2608. Client one 2606 is associated with a client onesubscription list 2602, and client two 2608 is associated with a client twosubscription list 2604. - Each subscription list contains a list of objects stored by the server-
side components 2500 for which the client wishes to be notified when the object is updated. The client onesubscription list 2602 indicates that client one 2606 wishes to be notified of changes to foo.doc (a file), bar.doc (also a file), changes touser 3's status, the group one folder list, as well as other objects and information stored by the server-side components 2500. The subscriptions to foo.doc and bar.doc will cause themessage server 2512 to update client one 2606 when either of these files are updated, deleted, renamed, opened by another client, or changed in some other way. Theentry concerning user 3's status will cause client one 2606 to be updated when the status ofuser 3 changes, such asuser 3 going online or offline,user 3 indicating he is busy,user 3 entering an idle state, and the like. The entry concerning the group one folder list will cause client one 2606 to be updated when folders that belong to the group one are updated, deleted, have items added to them, or are changed in some other way. The entries in the client twosubscription list 2604 are similar to the entries in the client onesubscription list 2602 and would behave in a similar way, but would cause client two 2608 to be updated as opposed to client one 2606. In one embodiment, notifications are sent by themessage server 2512 via long polling, but other suitable techniques for pushing information to clients could be used instead. - When a client such as client one 2606 initially connects to the server-
side component 2500, client one 2606 may, through theXIOS communicator 2504, request to have an object added to a subscription list. In one embodiment, theXIOS communicator 2504 adds the document to its internal subscription list, and in response, the document manager 912 (or another sub-component of the client-side component 2400) issues the request to theXML web service 2510. TheXIOS communicator 2504 communicates with theXML web service 2510, which instructs themessage server 2512 to add the object to a subscription list for client one 2606. Since client one 2606 had not been connected before, themessage server 2512 creates a new subscription list for client one, such as client onesubscription list 2602. This list will be identified by a key 2610. The key 2610 comprises a unique identifier, which is preferably difficult to guess. This key 2610 is then transmitted back to client one 2606 via theXML web service 2510 and theXIOS communicator 2504 so that client one 2606 is aware of the key 2610. In one embodiment, theXML web service 2510 and themessage server 2512 simply work together to generate the key 2610, which is then transmitted to client one 2606. In this embodiment, client one 2606 (as opposed to the XML web service 2510) instructs themessage server 2512 to add the object to the subscription list for client one 2606. - As mentioned previously, a client such as client one 2606 will be authenticated by the XML file system upon login to provide security. In one embodiment, this authentication is not duplicated between the
message server 2512 and client one 2606. The difficult-to-guess nature of the key 2610 in this embodiment, in addition to the previous authentication, should provide adequate security against third parties eavesdropping on the client onesubscription list 2602. A further advantage of using the key 2610 to provide security for clients of themessage server 2512, as opposed to a more resource intensive authentication technique, is that it reduces the load on themessage server 2512. -
FIG. 27 illustrates another aspect of one embodiment of the operation of themessage server 2512. In this figure, themessage server 2512 is depicted with three subscription lists: client onesubscription list 2602, client twosubscription list 2604, and client threesubscription list 2702. In the course of operation of the XML web service, thetransaction coordinator 2522 is notified when changes occur to monitored objects. Thetransaction coordinator 2522 then notifies themessage server 2512 that the notifications should be sent to all clients subscribed to that object. - One skilled in the art will recognize that, since the
message server 2512 contains a subscription list for each client using the XML web service, and each subscription list contains an entry for each object that the associated client is listening to, the amount of data stored on themessage server 2512 and the number of notifications that must be sent by themessage server 2512 will grow very quickly with the number of clients connected to the XML web service. One way to reduce the amount of work needed by themessage server 2512 is through the use ofmessage chains 2704. Amessage chain 2704 is a linked list that associates each subscription list listening to a given object. For example, inFIG. 27 , themessage chain 2704 links each subscription list on themessage server 2512 that is listening to the object bar.doc. Through the use of thismessage chain 2704, when themessage server 2512 is notified that there is a change to bar.doc, themessage server 2512 simply has to traverse the linked list of themessage chain 2704 first by notifying client one, then by notifying client two, then by notifying client three. This removes the need for themessage server 2512 to determine which of the multitude of subscription lists contain references to bar.doc, thereby saving processing time and increasing the efficiency of themessage server 2512. While only onemessage chain 2704 is depicted inFIG. 27 for simplicity, it will be understood that there may be one message chain associated with each object in the XML file system that is currently being monitored by a client. - XIOS File System—File Operations
- As discussed above, the XML file system stores the information representing the hierarchy of folders stored in the system in a
folder database 2520. AXIOS application 2402 may interact with the folder hierarchy via a folders.xml file retrieved by theXIOS communicator 2504 from theXML web service 2510. -
FIGS. 28A-28D illustrate one embodiment of anexemplary method 2800 for retrieving a folders.xml file. From astart block 2802, themethod 2800 proceeds to block 2804, where aXIOS application 2402 creates a file request for a folders.xml file and submits the file request to thedocument manager 912. In one embodiment, the request comprises a folder identifier (“folder ID”) that both uniquely identifies a folder and provides information usable by the server-side component 2500 to indicate the location of afolder database 2520 in which the folder information is stored. The folders.xml file may contain information pertaining to the folder associated with the folder ID, and also information associated with subfolders within that folder. The folders.xml file may also contain additional metadata associated with each folder, as described above. In one embodiment, the request submitted by theXIOS application 2402 takes the form of a URL. In another embodiment, theXIOS application 2402 may simply request the folders.xml file from thedocument manager 912, which will form a URL representing the request. - In one embodiment, the
document manager 912 may already have a cached copy of the folders.xml file, in which case thedocument manager 912 will simply provide the cached copy of the document to theXIOS application 2402. However, the remainder of this description assumes that no cached copy of the requested document exists within thedocument manager 912. Themethod 2800 continues to block 2806, where thedocument manager 912 obtains aXIOS communicator 2504 from thecommunication manager 2412 and passes the file request to the load function of theXIOS communicator 2504. Themethod 2800 then proceeds to block 2808, where theXIOS communicator 2504 transmits a request for the folders.xml file to the appropriateXML web service 2510 of the server-side component 2500, the request comprising the folder ID. Next, atblock 2810, the server-side component authenticates the user, and routes the request to theXML web service 2510. Themethod 2800 then proceeds to block 2812, where theXML web service 2510 determines a folder database that hosts the folder tree associated with the folder ID, based at least in part on the content of the folder ID. Themethod 2800 then proceeds to a continuation terminal (“terminal A1”). - From terminal A1 (
FIG. 28B ), themethod 2800 proceeds to block 2814, where theXML web service 2510 queries theappropriate folder database 2520 to retrieve information associated with the requested folder. This retrieved information may include the folder access control list (ACL), and may also include additional folder metadata information. Next, themethod 2800 proceeds to a continuation terminal (“terminal B”) and then to block 2816, where theXML web service 2510 adds the folder information to the folders.xml file. In one embodiment, the folder information added to the folders.xml file does not include the folder ACL. Instead, the folders.xml implicitly indicates that the requesting user has at least read access to every folder in the folders.xml file. More detailed information concerning the ACLs of the folders may be obtained in this embodiment via a separate request. Examples of some of the advantages of this technique are that the size of the folders.xml file and the complexity of the processing performed by the server-side component 2500 are kept to a minimum. - At this point, the folders.xml file being constructed by the
XML web service 2510 contains information pertaining to only the folder identified by the folder ID. A request for the folders.xml file for a given folder will also return information pertaining to the subfolders of the requested folder. Since folder information for multiple folders—each of which might have different associated permissions (and therefore different ACLs)—will be returned to the client in a single folders.xml file, it is important that only information about folders having matching ACLs is included in a given folders.xml file. To that end, themethod 2800 proceeds to block 2818, where theXML web service 2510 queries thefolder database 2520 to retrieve information associated with the immediate subfolders of the folder identified by the folder ID, including a folder ID and an ACL of each subfolder. Then, using the results of that query, themethod 2800 proceeds to a FOR loop, beginning withblock 2820, and a continuation terminal (“terminal C”) that indicates the start of the FOR loop. From terminal C, themethod 2800 proceeds to block 2822, where theXML web service 2510 compares the ACL of the subfolder to the ACL of the requested folder. Themethod 2800 then proceeds to another continuation terminal (“terminal A2”). - From terminal A2 (
FIG. 28C ), themethod 2800 continues to adecision block 2824, where a test is performed to determine whether the ACL of the subfolder matches the ACL of the requested folder. If the answer to the test atdecision block 2824 is YES, themethod 2800 returns to terminal B, adds the current subfolder to the folders.xml file atblock 2816, and themethod 2800 recurses on any further subfolders of the current subfolder. Otherwise, if the answer to the test atdecision block 2824 is NO, themethod 2800 proceeds to block 2826, where theXML web service 2510 adds an XLINK that references the subfolder to the folders.xml file, as opposed to any further information concerning the subfolder. Themethod 2800 then proceeds todecision block 2828, where a test is performed to determine whether there are any more subfolders. - The use of an XLINK provides the client with enough information to request a new folders.xml file containing the subfolder having a different ACL without exposing information to the client that would require a separate permission check. This is important because, as discussed above, the folders.xml file contains an implicit assertion that the client has at least read access to each folder contained within it. If a subfolder has a different ACL from the requested folder (e.g., if the subfolder is owned by a different user, if the subfolder is shared in a different group, etc.), this implicit assertion may not be true for the subfolder. The use of an XLINK allows minimal information about the subfolder to be provided to the client while still maintaining the truth of this implicit assertion.
- If the answer to the test at
decision block 2828 is YES, themethod 2800 proceeds to continuation terminal C, and the next subfolder is processed. Otherwise, if the answer to the test atdecision block 2828 is NO, themethod 2800 proceeds to another continuation terminal (“terminal A3”). - From terminal A3 (
FIG. 28D ), themethod 2800 proceeds to block 2830, where theXML web service 2510 caches a copy of the complete folders.xml file to expedite future requests for the same folder (assuming changes are not made to the folder hierarchy between client requests, in which case the cached folders.xml file would be regenerated). Next, atblock 2832, theXML web service 2510 returns the complete folders.xml file to theXIOS communicator 2504. Themethod 2800 then proceeds to block 2834, where theXIOS communicator 2504 provides the folders.xml file to thedocument manager 912. Next, atblock 2836, thedocument manager 912 caches the folders.xml file, and provides the folders.xml file to theXIOS application 2402. Themethod 2800 then proceeds to afinish block 2836 and terminates. -
FIG. 28E illustrates one example of afolders.xml file 2840 produced by an embodiment of the above-describedmethod 2800. For the purposes ofFIG. 28E , it is assumed that theXML file system 2500 stores a folder hierarchy, such as the folder hierarchy depicted in thetree component 800 ofFIG. 8A , and a user has requested a folders.xml file for the folder “RESEARCH.” Also depicted inFIG. 28E is a set ofline numbers 2842, included for ease of discussion. - As shown in
FIG. 28E , themethod 2800 has created thefolders.xml file 2840 in response to the request. Lines 1-4 of thefile 2840 contain header information used to identify an XML version and schema for the remainder of the document. Themethod 2800 created an entry for the requested folder “RESEARCH” (at line 6), and then enumerated the subfolders of the requested folder to add any further folders with a matching ACL. In this case, the folders “PERSONAL,” “WORK,” and “LETTERS,” shown inFIG. 8A and atlines file 2840, respectively, were found to have matching ACLs. The method also proceeded to add any subfolders of those folders that also have matching ACLs. In this case, the folders “PERSONAL” and “LETTERS” did not have any subfolders, but the folder “WORK” had two subfolders with matching ACLs, “BROWSERS” and “VIDEO ENCODING,” found atlines method 2800 added limited metadata information to thefile 2840. In the embodiment illustrated here, themethod 2800 added metadata including a “name”, an “id”, and a “type” for each folder, but in other embodiments, either more or less metadata may be added. Further, although the “id” elements are shown as integer values for the sake of simplicity, the “id” values may contain more complex information, as discussed above, to indicate thefolder database 2520 storing the folder information. Alternatively, simple values such as the integer values may be used for the “id” elements, and a lookup may be performed to determine thefolder database 2520 storing the folder information. - The
method 2800 also created an entry for the folder “EMAIL,” which does not have an ACL that matches the ACL of the “RESEARCH” folder. The entry for the “EMAIL” folder, shown from lines 13-19, contains minimal information about the folder, only showing its “name” element. It also contains an XLINK that may be traversed by the user to generate a new folders.xml file that contains the information for the “EMAIL” folder (as well as any subfolders having an ACL matching the “EMAIL” folder ACL). - In one embodiment, the folders.xml file contains information concerning the folder hierarchy, but not information about the individual files within the folders.
FIG. 29 illustrates one embodiment of amethod 2900 for retrieving a list of files in a given folder when the folders.xml file does not contain file list information. From astart block 2902, themethod 2900 continues to block 2904, where aXIOS application 2402 creates a file list request and submits the file list request to thedocument manager 912, the file list request comprising a folder ID of a specified folder. As described above, the folder ID contains information indicating afolder database 2520 that stores information about the contents of the specified folder. The file list request may also comprise further options, such as filters for desired file types, sorting preferences, date range filters, and the like. Next, themethod 2900 continues to block 2906, where thedocument manager 912 obtains aXIOS communicator 2504 from thecommunication manager 2412, and passes the file list request to theXIOS communicator 2504. Next, atblock 2908, theXIOS communicator 2504 transmits the query to the appropriateXML web service 2510 of the server-side component 2500. Themethod 2900 then continues to block 2910, where the server-side component 2500 authenticates the user and routes the request to theXML web service 2510, which checks the permissions on the requestedfolder 2910. To check the permissions on the requested folder, theXML web service 2510 may query thefolder database 2520 to retrieve the ACL for the given parent folder, and determine whether the ACL grants access to the authenticated user. - Once the user has been authenticated and the permissions have been verified, the
method 2900 proceeds to block 2912, where theXML web service 2510 determines anindexing server 2518 corresponding to the requested folder ID, and transmits a query to theindexing server 2518. As discussed above, information contained within the folder ID may be used by theXML web service 2510 to determine thecorresponding indexing server 2518. Next, atblock 2914, theindexing server 2518 queries an index to retrieve a file list for the requested folder, and processes the result with respect to the ACL of each file in the list. In one embodiment, the index of theindexing server 2518 is a full-text index of file information, and one of the indexed fields for each file contains the folder ID of the parent folder. The processing of the result with respect to the ACL of each file in the list ensures that only files for which the authenticated user has access are added to the folder list. In one embodiment, this processing is omitted in order to conserve processing time, and instead the user permissions are enforced when the user attempts to access one of the files. - Next, at
block 2916, theindexing server 2518 formats the list of files returned by the index, along with limited file metadata retrieved from the index, as a feed in a suitable format (e.g., ATOM, RSS, or other suitable format), and returns it to the client-side component 2400. The limited file metadata may include such items as the last modified date, the author, the file type, and the like. Themethod 2900 then continues to anend block 2918 and terminates. - Since data is stored collaboratively in the XML file system and multiple clients may be updating a given parent folder or creating the same file, the simple creation of a file in the XML file system in some embodiments may include coordination between the file-creating client and aspects of the server-
side component 2500.FIGS. 30A-30C illustrate one embodiment of amethod 3000 for creating a file within the XML file system. From astart block 3002, themethod 3000 proceeds to block 3004, where aXIOS application 2402 specifies a file name and a destination folder for the new file, and initializes a raw file data content. Initializing the raw file data content may create a new, empty file, or may insert existing content into the raw file data (such as when a user first saves content which she has already started to create). Next, atblock 3006, theXIOS application 2402 submits a file creation request to thedocument manager 912, the file creation request comprising the file name, the destination folder ID, and the raw file data content. In one embodiment, at least part of this request is formatted as a URL. Themethod 3000 then proceeds to block 3008, where thedocument manager 912 obtains aXIOS communicator 2504 from thecommunication manager 2412, and passes the file creation request to theXIOS communicator 2504. Next, atblock 3010, theXIOS communicator 2504 transmits a request to create a new file to theXML web service 2510 of the server-side component 2500. Themethod 3000 then proceeds to block 3012, where the server-side component 2500 authenticates the user, and routes the request to theXML web service 2510. - Next, the
method 3000 then proceeds to block 3014, where theXML web service 2510 determines a folder database that hosts the destination folder, and checks that the user has permission to create the file in the destination folder. As discussed above, the folder ID of the destination folder contains information that allows theXML web service 2510 to determine a folder database that contains information associated with the destination folder. As also discussed above, theXML web service 2510 may ensure that the user has permission to create the file by querying thefolder database 2520 to retrieve the ACL for the destination folder, and determining whether the ACL grants the appropriate rights to the authenticated user. Themethod 3000 then proceeds to a continuation terminal (“terminal A1”). - From terminal A1 (
FIG. 30B ), themethod 3000 proceeds to block 3016, where theXML web service 2510 checks if the specified destination folder is a special folder. In one embodiment, there are two types of folders in the XML file system: storage folders and special folders. A storage folder is much like a folder in a conventional file system, in that it is primarily used to store files and other folders. A special folder, in contrast, is used by the XML file system to abstract another form of communication. This allows aXIOS application 2402 to interact with this other form of communication in the same way it would interact with a file in storage, thus simplifying application development. For example, a special folder may be designated as an e-mail special folder, and creating a new file in the e-mail special folder would cause a piece of e-mail to be sent. In one embodiment, there are two special folders for each user: an incoming special folder, or “inbox,” and an outgoing special folder, or “outbox.” In other embodiments, more or fewer special folders exist. - The
method 3000 continues to adecision block 3018, where a test is performed to determine whether the specified destination folder is a special folder. If the answer to the test atdecision block 3018 is YES, themethod 3000 proceeds to block 3019, where the request is transmitted to a server process associated with the special folder for further processing. One example of an embodiment of such processing is discussed below with relation to themethod 3600 illustrated inFIG. 36 , and the accompanying text. Themethod 3000 then proceeds to a continuation terminal (“terminal B”). - Although
FIG. 30B illustrates that a method such asmethod 3600 occurs before the new file is created in the special folder, this need not necessarily be the case. In one embodiment, the test performed atdecision block 3018 may instead be performed after the file has been created, such as after terminal B (FIG. 30C ). In such an embodiment, a server process that monitors the special folder would operate on the file created in the special folder, as opposed to operating directly on the request from the client. The server process could be notified of the creation of the file by polling the contents of the special folder. Alternatively, the server process could be notified of the creation of the file by creating a subscription list associated with the process on the message server, adding the special folder to the subscription list, and thereby receiving a notification from the message server about the creation of the file, for example atblock 3030 of themethod 3000. - If the answer to the test at
decision block 3018 is NO, themethod 3000 proceeds to block 3020, where afile server 2516 allocates space for raw file data of the new file in a storage location associated with the file server, and stores the initial raw file data at that storage location. Next, atblock 3022, afolder database 2520 creates an entry for the new file in the folder database, the entry containing limited metadata associated with the file, including the file name, date created, unique file ID, storage location, and the like. In one embodiment, a file may have more than one file stream associated with a single file ID. In that case, thefile server 2516 allocates a separate space in the storage location for each stream, and the metadata stored in thefolder database 2520 associates the file ID with all of the storage locations. The XML file system exposes all of the streams associated with the file to the client through the available metadata of the file. - The
method 3000 then proceeds to block 3024, where thefolder database 2520 associates the new file with the specified destination folder. The association created between the parent folder and the new file will allow theXML web service 2510 to query thefolder database 2520 and theindex server 2518 using the folder ID to find the file when searching for the files contained within the folder. Themethod 3000 then continues to another continuation terminal (“terminal A2”). - From terminal A2, (
FIG. 30C ), themethod 3000 continues to block 3026, where theXML web service 2510 transmits metadata for the new file to anindex server 2518. This metadata may be the same metadata stored by the folder database, which is copied to theindex server 2518 to facilitate fast full-text searching of the metadata. The metadata transmitted to theindex server 2518 may also include further information beyond that stored in the folder database for which full-text indexing would be beneficial, such as user- or application-specified properties, author information, user comments, and the like. The metadata transmitted to theindex server 2518 may also include information extracted directly from one or more file streams associated with the file. - Next, at
block 3028, theXML web service 2510 transmits a notification to themessage server 2512 that the new file was created in the specified destination folder. Alternatively, this notification may be sent by thefolder database 2520 or theindex server 2518 upon detecting the association of the new file with the parent folder. Themethod 3000 then proceeds to block 3030, where themessage server 2512 transmits an update notification to each client that has the specified destination folder in its subscription list. Next, atblock 3032, the client transmits a request to themessage server 2512 through theXML web service 2510 to add the new file to the subscription list of the client, the request comprising the file ID. Next, atblock 3034, themessage server 2512 adds the new file to the subscription list of the client. Then, themethod 3000 proceeds to terminal B, and then to anend block 3036, where themethod 3000 terminates. -
FIGS. 31A-31E illustrate one embodiment of amethod 3100 for opening existing files within the XML file system. From astart block 3102, themethod 3100 continues to a set ofmethod steps 3104, defined between a continuation terminal (“terminal B”) and an exit terminal (“terminal C”). The set of method steps 3104 describes a method of opening an existing file that is not being shared (in other words, a file that is not currently opened by another client). From terminal B (FIG. 31B ), themethod 3100 proceeds to block 3110, where aXIOS application 2402 on a first client requests a file from thedocument manager 912, the request comprising a file ID. In one embodiment, the request is in the form of a URL. The request may comprise a file ID that is incorporated into a newly generated URL, or the first client may already have obtained a URL capable of addressing the file, such as a file URL included within a file list. In one embodiment, the URL may not contain the file ID itself, but instead comprises information from which the file ID may be derived. - Next, at
block 3112, thedocument manager 912 obtains aXIOS communicator 2504 from thecommunication manager 2412 and passes the file request to theXIOS communicator 2504. Themethod 3100 then proceeds to block 3114, where theXIOS communicator 2504 transmits a request for the file to an appropriateXML web service 2510 of the server-side component 2506, the request comprising the file ID. As described above, the request may be in the form of a URL which comprises the file ID, or may instead comprise information from which the file ID may be derived. Next, atblock 3116, the server-side component 2506 authenticates the user, and routes the request to theXML web service 2510. - In one embodiment, the file ID or the file URL contained within the request also contains information indicating a
file server 2516 on which the file resides, to help theXML web service 2510 to determine anappropriate folder database 2520,file server 2516, ortransaction coordinator 2522 for obtaining the file. In another embodiment, the request may also include the folder ID of the parent folder, and theXML web service 2510 may determine the appropriate data storage servers for obtaining the file based on information contained within in the folder ID. The number of different servers that must be contacted for a single file request, and accordingly the amount of information provided in the file ID or file URL, depends on how the database is partitioned, and thereby the amount of scalability provided by the particular embodiment. - Next, at
block 3117, theXML web service 2510 checks that the user of the first client has permission to open the file, and submits the request for the file to anappropriate transaction coordinator 2522. In one embodiment, theXML web service 2510 checks the client permissions by retrieving the ACL for the file from anappropriate folder database 2520, and by checking if the ACL allows the authenticated user to access the file. Next, atblock 3118, thetransaction coordinator 2522 instructs amessage server 2512 to add the requested file to a subscription list of the first client. Themethod 3100 then proceeds to block 3119, where thetransaction coordinator 2522 determines if the file is currently shared. Themethod 3100 then proceeds to a continuation terminal (“terminal B1”). - From terminal B1 (
FIG. 31C ) themethod 3100 proceeds todecision block 3120, where a test is performed to determine whether the file is currently shared. If the answer to the test atdecision block 3120 is YES, the method proceeds to a continuation terminal (“terminal D1”). Otherwise, if the answer to the test atdecision block 3120 is NO, themethod 3100 proceeds to block 3122, where thetransaction coordinator 2522 queries anappropriate folder database 2520 to determine thefile server 2516 storing the raw file data. Next, atblock 3124, thetransaction coordinator 2522 retrieves the raw file data from theappropriate file server 2516. Then, atblock 3126, thetransaction coordinator 2522 returns the raw file data to theXML web service 2510 with the shared flag set to FALSE. Next, atblock 3128, theXML web service 2510 returns the raw file data to theXIOS communicator 2504 of the first client with a shared flag set to FALSE. Themethod 3100 then proceeds to block 3129, where theXIOS communicator 2504 provides access to the raw file data to thedocument manager 912, which in turn provides access to the raw file data to theXIOS application 2402. Themethod 3100 then proceeds to another continuation terminal (“terminal C”). - From terminal C (
FIG. 31A ), themethod 3100 proceeds to a set ofmethod steps 3106 defined between terminal D and terminal E, which describes a method of opening an existing file that is being shared by another client. For the purposes of this description, this set of method steps 3106 assumes that the set of method steps 3104 has already been executed by the first client, and hence the requested file has already been opened by the first client. - From terminal D (
FIG. 31D ), themethod 3100 proceeds to block 3130, where aXIOS application 2402 on a second client transmits a file request to the server-side component 2514 via thedocument manager 912 andXIOS communicator 2504, the file request comprising the file ID. As discussed above, the request may be in the form of a URL comprising the file ID, or may be in the form of a URL comprising information from which the file ID may be derived. Since the individual actions that comprise the actions atblock 3130 were described in detail above, those more detailed descriptions have been omitted here for brevity. Next, atblock 3132, the server-side component 2514 authenticates the user of the second client, and routes the request to theXML web service 2510. Themethod 3100 then proceeds to block 3134, where theXML web service 2510 checks that the user of the second client has permission to open the file, and submits the request for the file to anappropriate transaction coordinator 2522. Themethod 3100 then proceeds to block 3136, where thetransaction coordinator 2522 instructs themessage server 2512 to add the file to a subscription list of the second client. One skilled in the art will recognize the similarities between the method defined between blocks 3110-3116, and the corresponding blocks 3130-3136, as up to this point, there is little difference between the method for opening a file that is shared and opening a file that is not shared. - Next, at
block 3138, thetransaction coordinator 2522 determines that the requested file is currently shared. At this point, the method for opening a file that is shared diverges from the method for opening a file that is not shared. Themethod 3100 proceeds to terminal D1, and then to block 3140, where thetransaction coordinator 2522 queries thefolder database 2520 to determine thefile server 2516 storing the raw file data. Next, atblock 3142, thetransaction coordinator 2522 retrieves and caches a copy of the raw file data from theappropriate file server 2516. Next, atblock 3144, thetransaction coordinator 2522 instructs themessage server 2512 to notify the first client that the file is now shared. Themethod 3100 then proceeds to another continuation terminal (“terminal D2”). - From terminal D2 (
FIG. 31E ), themethod 3100 proceeds to block 3146, where thetransaction coordinator 2522 transmits the raw file data to theXML web service 2510 with the shared flag set to TRUE. This will notify theXML web service 2510 and theXIOS communicator 2504 to treat the raw file data differently than if the file was not shared. Next, atblock 3148, theXML web service 2510 returns the raw file data to the second client with the shared flag set to TRUE. Themethod 3100 then proceeds to block 3150, where themessage server 2512 notifies at least the first client that the file is now shared. Themethod 3100 then proceeds to block 3152 where, in response to receiving the notification that the file is now shared, the first client transmits any previously uncommitted transactions to theXML web service 2510. - As discussed below, as changes are made to the file data model on the first client, the
transaction manager 910 of the first client may gather these changes without immediately transmitting them to theXML web service 2510 for storage. This is especially likely if the first client was operating in an offline mode, but it may also occur due to high network latency, high processor load, and the like. When the first client receives the notification that the file is now shared, thetransaction manager 910 takes any uncommitted transactions and transmits them to theXML web service 2510. - At
block 3154 of themethod 3100, theXML web service 2510, after receiving these transactions, transmits the uncommitted transactions to thetransaction coordinator 2522, which commits the unsaved transactions to the cached version of the raw file data that is stored by thetransaction coordinator 2522. These transactions will eventually be committed to the raw file data on thefile server 2516. In one embodiment, the transactions will be committed when a client holding the file executes a save command. In another embodiment, the changes will be committed after a certain time period. In yet another embodiment, the changes will be committed after all client users of the document have disconnected. Next, atblock 3156, thetransaction coordinator 2522 instructs themessage server 2512 to notify all listening clients of the committed changes. Themethod 3100 then proceeds to block 3158, where the first client and the second client receive the notification of the committed changes from the message server. Next, themethod 3100 proceeds to terminal E and terminates. - Network Operating System Client Component Startup
-
FIG. 32A illustrates one embodiment of amethod 3200 of starting a client-side component 2400 of a network operating system. From astart block 3202, themethod 3200 proceeds to block 3204, where a boot loader of the client-side component 2400 instantiates the system context object 902 (FIG. 9 ) with its associated managers and starts a communication channel to anXML file system 2500. In some embodiments, the use of a boot loader is not required, since the XML virtual machine is already contained in the client-side component 2400. For example, this would be the case in embodiments where the client-side component 2400 is implemented outside a Web browser as a stand-alone application, such as within a mobile device, on a set-top box or thin client component. This would also be the case for embodiments implemented as a machine operating system that does not require a host operating system for execution. The network operating system can work by retrieving files, including the files that define the startup process, over any network connection, including but not limited to using the HTTP protocol over the Internet. Even without the startup process described inmethod 3200, the network operating system will operate, but any initial configuration will be driven by a user executing the configuration steps manually. - Unlike traditional operating systems, some embodiments of the client-
side component 2400 may be hosted within another program, such as within an existing Web browser. For those embodiments, particular settings concerning the startup sequence, including which particular XML file system(s) 2500 to connect to or the communication channel to start, may be determined by a location URL navigated to using the host program, HTTP query parameters, HTTP cookies, or other configuration parameters associated with the client (such as IP, location, machine, browser ID, etc.). For example, directing a Web browser to http://os1.icloud.com may cause the client-side component 2400 to connect to a firstXML file system 2500, and directing a Web browser to http://os2.icloud.com may cause the client-side component 2400 to connect to a secondXML file system 2500 hosted in a different location from the firstXML file system 2500. - In one embodiment, the client-
side component 2400 may start a communication channel to a data source other than (or in addition to) anXML file system 2500 during the startup sequence, and may either connect to a remote data source or may access a local data source. For example, one file system may be a global XIOS file system provided through a service provider data center. Another file system connected to during the startup sequence may be installed locally on an enterprise network. A third file system connected to during the startup sequence may give access to a user's local hard drive.FIG. 32B illustrates several examples of data sources bound by the client-side component 2400 during startup as drives. For instance, a drive of the local machine has been bound as “Local Drive.” Also, a folder in anXML file system 2500 has been bound as “Shared Family Folder.” As yet another example, the root folder for a group has been bound as “Class of 1992 Reunion.” Importantly, while each of these data sources is stored in a different place and is accessed via differing techniques, the differences are hidden fromXIOS applications 2402, which would see each data source simply as an accessible drive. While these examples are not exhaustive, they are intended to show that the startup sequence may connect to one or more than one file system. Once a user is authenticated the startup sequence may be continued with a user-specific startup sequence that may include connections to additional file systems and the initialization of additional channels. - Another difference between embodiments of the network operating system hosted within another program and a traditional operating system is that operations performed with respect to the host program may interrupt the execution of the client-
side component 2400. For example, after a user has successfully completed the startup sequence and is logged in to the network operating system, the host program may perform an operation to reload the client-side component 2400. In some embodiments, the client-side component 2400 handles this situation by making the logged-in state of the network operating system before reloading available to the client-side component 2400 after reloading to restore its state. To that end, at block 3206 (FIG. 32A ), the client-side component 2400 checks whether a user is already logged in. Themethod 3200 continues to adecision block 3208, where a test is performed to determine whether the user is already logged in. If the answer to the test atdecision block 3208 is YES, themethod 3200 proceeds to a continuation terminal (“terminal A”), thereby skipping the login portion of the startup method. - If the answer to the test at
decision block 3208 is NO, themethod 3200 proceeds to block 3210, where the client-side component 2400 opens a login application associated with the communication channel. The particular login application to be launched may be determined by the communication channel, but typically, a login application will securely request credentials from the user, such as a user name and a password. Other embodiments of the login procedure exist where the login information is requested before the boot loading has started, and that login information is directly passed into the communication channel for authentication without further user interaction. In embodiments where there is no boot loader, the client-side component 2400 may pass the login information directly into the communication channel for authentication. Variations may also occur where the boot loader, after loading directly, will by itself ask for the login information, and then pass the information on to the communication channel without utilizing a separate login application. Next, atblock 3212, the communication channel processes the user credentials. The communication channel may process the user credentials by transmitting them to an authentication service, or by processing them locally. - The
method 3200 then proceeds to terminal A. From terminal A, themethod 3200 proceeds to block 3214, where the communication channel provides the user's settings.xml file to the client-side component 2400, which uses the settings.xml file to perform a user-specific startup sequence and to mount all specified virtual drives. The communication channel may obtain the settings.xml file from a remote data source, obtain the settings.xml file from a local data source, or generate a default settings.xml file based on communication channel-specific defaults. The settings.xml file contains a collection of user-specific settings for configuration of the network operating system. These settings may include, but are not limited to: a user name, an email address, settings for various applications, a collection of virtual drives (communication channels) and associated root folder IDs to be mounted upon startup (including groups, as discussed below), a list of friends, and a startup sequence. The startup sequence contained in the settings.xml file specifies what programs the client-side component 2400 should launch after a successful login, including which desktop manager, console, or start application to open, if any. Next, the method proceeds to afinish block 3216 and terminates. - In some embodiments, the settings.xml file is more of a passive container of metadata representing various items in the network operating system, and the startup application plays a more central role in driving the startup sequence. For example, in one embodiment, the startup application is executed, and then executes a second application, such as a desktop application, to display a desktop to the user. Although this sequence would be executed by the startup application in this embodiment, the startup application may nevertheless determine which second application to execute by consulting the settings.xml file.
- Network Operating System Groups and Friends
- In the network operating system, groups are used to quickly and efficiently enable collaboration and file sharing between users. Unlike other systems, the creation of a new group and the enabling of collaboration and file sharing in the network operating system is very lightweight. For example, in one embodiment, a user need simply right-click to create a new group, which will automatically create a common storage folder and allow members of the group to exchange messages, create a new identity to interact with other members of the group, and collaborate with one another in real time.
- A group, upon creation, stores a collection of group information. This group information includes a root folder ID, which acts as a reference to a storage location in an
XML file system 2500, as described above. The folders and files located at this storage location will be accessible only to members of the group. As described above, upon starting the client-side component 2400, a settings.xml file is obtained for the logged-in user. This settings.xml file contains a collection of references to the groups of which the user is a member. Those references can then be used by the client-side component 2400 to mount the group as if it was any other storage location or file system by providing a reference to the desired group to thecommunication manager 2412 in order to launch the appropriate communicator and communication channel. -
FIG. 33 illustrates one embodiment of amethod 3300 for mounting a network operating system group. From astart block 3302, themethod 3300 proceeds to block 3304, where the client-side component 2400 starts a communication channel for the group. Next, atblock 3306, the communication channel processes user credentials associated with a user. The communication channel may prompt the user for any additional credentials specific to the group, such as a membership name and password, or it may reuse the user login credentials for an easy single sign-on. Assuming the communication channel was able to verify the user credentials, themethod 3300 then proceeds to block 3308, where the communication channel obtains the group folders.xml file using a root folder ID obtained from a user settings.xml file. Next, atblock 3310, the client-side component 2400 adds a reference to the group folders.xml file to an existing folders.xml file on the client. (The creation of the existing folders.xml file is discussed in further detail above in relation toFIGS. 28A-28D , and at least one folders.xml file is created via an embodiment of that process, or another process, during startup.) This reference may represent a virtual channel to the communication manager XML document, #CommunicationManager, which contains a list of all open communication channels on the client. Next, atblock 3312, the communication channel obtains an autostart.xml file for the group, if one exists, and the client-side component 2400 executes the instructions or applications specified in the autostart.xml file. This autostart.xml file allows a group administrator to specify common programs that will always be executed by a group member upon logging in to the group, such as auditing programs, welcome screens, common desktop configurations, a community representing the group, and the like. Groups may also specify alternative startup sequences that users may choose to have as their user startup sequence upon login to the system. Themethod 3300 then proceeds to afinish block 3314 and terminates. - In some embodiments, the
method 3300 may also be used to mount file storage locations, as file storage locations have most of the same features of groups. File storage locations lack the concept of having associations that are members of the file storage location (as described above for groups), but the process for mounting the file storage location and accessing the files within it are quite similar. File storage locations may even include an autostart.xml file, as described above. - Either group functionality or file storage locations may also be used to implement communities. A file storage location could be used for creating communities, with no specific membership required. In other words, all users would automatically be members of the community. Group functionality, on the other hand, could be used to create membership-only communities.
- The group information described above may also include a collection of memberships. A membership is an association between a user and a group, and represents the fact that the user is a member of the group. Each membership may have an associated name, which will be shown to other members of the group, thus creating a new identity for the user when interacting within the group. Since the membership names may be created by a user when joining a group, users may be able to join groups with widely varying subject matter while keeping their privacy. For example, a group named “Group One” might have a collection of memberships indicating that a user with the username “Alice” and a user with the username “Bob” are both members of Group One. The first membership, indicating that Alice is a member of Group One, may be the same or similar to Alice's username, such as “AliceGroupOne.” The second membership, indicating that Bob is a member of Group One, may be different from Bob's username, such as “AnonymousGroupMember.” When Alice searches for other group members, she is given access to the list of membership names, but not the associated user names. Hence, she will see that “AnonymousGroupMember” is a member of the group, but she will not know that “AnonymousGroupMember” is actually associated with “Bob.” Alternatively, members in a group may choose to make the associated user name public, in which case, Alice would be able to tell that “AnonymousGroupMember” is associated with “Bob.”
- The messaging services are capable of handling multiple identities of users in its inter-user communication. This is also true for the friends handling of the system, in that one user can have the same friend in his friends list as two different entries, without knowing that it is actually the same person. The user would also receive different instant messages from the two different entries without knowing that they are both sent by the same person.
- Transitioning Between Online and Offline States
- In some embodiments of the network operating system, the client-
side component 2400 is capable of working in both a normal, online state, and in an offline state wherein the client-side component 2400 does not have access to any server-side resources. One advantage of providing this functionality in the client-side component 2400 is that it helps the client-side component 2400 seamlessly support a single application operating in both online and offline modes while minimizing the amount of work required of the application developer to support both modes. -
FIG. 34 illustrates one embodiment of amethod 3400 for transitioning the client-side component 2400 of a first client from an online state to an offline state. Thismethod 3400 assumes that the client-side component 2400 of a first client has previously started up and connected to anXML file system 2500 via a method such asmethod 3200. From astart block 3402, themethod 3400 proceeds to block 3404, where the client-side component 2400 of the first client sets a status of the first client to an offline state by sending a notification to theXML web service 2510 of theXML file system 2500. This status can then be checked by other clients using the same XML web services to determine that the first client is offline. Next, atblock 3406, theXML web service 2510 instructs themessage server 2512 to send a notification to all other clients subscribed to the status of the first client that the first client is offline. Typically, the other clients connected to theXML file system 2500 that are associated with the same group as the first client will have added the first client to their subscription list on themessage server 2512. The notifications are sent out by themessage server 2512 in essentially the same way as notifications concerning file updates, which are described in more detail above. - In order for the client-
side component 2400 and the applications executed by theclient component 2400 to continue to function without having access to theXML file system 2500, the client-side component 2400 must cache any necessary resources from theXML file system 2500 on the first client. To this end, themethod 3400 proceeds to block 3408, where theapplication manager 904 of the first client downloads all outstanding, not already downloaded resources indicated in an application package associated with each instance currently being executed by the client-side component 2400. An application developer may indicate in the application package which resources should be cached by the client-side component 2400 to enable offline use of the application. Alternatively, the client-side component 2400 may automatically determine what resources should be cached by analyzing the references used by components of the application package. - In some embodiments, the
application manager 904 may perform additional, optional steps for determining what resources should be cached on the first client. For example, themethod 3400 may proceed to block 3410, where theapplication manager 904 of the first client downloads any resources dynamically loaded by each instance. These resources would not be referenced by the application package associated with the instance, but would instead be determined by the instance while executing. Themethod 3400 may then proceed to block 3412, where theapplication manager 904 of the first client downloads resources associated with each open view file. As with the dynamically loaded resources, each open view file may be associated with resources that are not referenced by the application package. Themethod 3400 may also proceed to block 3414, where theapplication manager 904 similarly downloads resources associated with each process. One skilled in the art will recognize that since blocks 3410-3414 are optional, one, more than one, or none of the blocks may be executed in embodiments of themethod 3400. - After resources are downloaded at
block 3408 and zero or more of blocks 3410-3414, themethod 3400 then proceeds to block 3416, where the client-side component 2400 of the first client sets a system flag that indicates the first client is offline. This system flag may be used to change the behavior of both the client-side component 2400 and the applications executed on the first client. For example, in one embodiment, themethod 3400 continues to block 3418, where the client-side component 2400 of the first client queues subsequent file operations, and each channel of the first client caches subsequent transactions describing modifications to files, instead of immediately transmitting file operations and transactions to theXML file system 2500. Since the client-side component 2400 queues file operations and caches transactions while offline, it can appear to a user of the network operating system that no change has taken place when the first client goes offline. - Applications executed by the client-
side component 2400 may also change their behavior based on the system flag, such as by disabling functionality that requires network connectivity. The client-side component 2400 itself may change its behavior further, such as by displaying an error message if a user of the first client tries to perform an action that requires network connectivity. Themethod 3400 then proceeds to afinish block 3420 and terminates. -
FIG. 35 illustrates one embodiment of amethod 3500 of coming back online when a first client has already executed a method, such asmethod 3400, and has been operating in an offline state. From astart block 3502, themethod 3500 proceeds to block 3504, where the first client goes online, and the client-side component 2400 of the first client sends a notification of an online state to theXML web service 2510. The first client may go online by establishing or re-establishing a connection to one of, but not limited to, a local-area network, a wireless network, a dial-up network, and the like. Alternatively, the first client may go online when a user indicates a desire to go online, when the network connection has already been established. Next, atblock 3506, theXML web service 2510 instructs themessage server 2512 to send a notification to all clients subscribed to the status of the first client that the first client is online. - The
method 3500 then proceeds to block 3508, where thetransaction manager 910 of the first client downloads any changes to documents cached on the first client from theXML web service 2510. In one embodiment, these downloaded changes are changes made to the documents in theXML file system 2500 by other clients while the first client was offline. Next, atblock 3510, thetransaction manager 910 of the first client resolves any conflicts between the cached documents and the downloaded changes. In one embodiment, thetransaction manager 910 merely detects that a conflict exists, and prompts the user to manually resolve the conflict (by creating a new file to contain the cached changes, to cancel the cached changes in favor of the downloaded changes, etc.). In another embodiment, thetransaction manager 910 executes an algorithm that decides which changes should be retained and which should be discarded. - Next, at
block 3512, thetransaction manager 910 of the first client transmits any queued file operations to theXML web service 2510. For example, if the user of the first client attempted to create, delete, or rename any files in theXML file system 2500 while offline, the file operations will be transmitted to theXML file system 2500 at this point. In one embodiment, theXML file system 2500 will detect any conflicts with changes made by other users (such as an attempt to rename a file that was previously deleted, etc.) and respond appropriately. - The
method 3500 then proceeds to block 3514, where the client-side component 2400 of the first client contacts themessage server 2512, through theXML web service 2510, to re-add any monitored objects to the subscription list of the first client. Next, atblock 3516, the client-side component 2400 of the first client sets a system flag that indicates the first client is online. In one embodiment, setting this system flag returns the client-side component 2400 and the applications to their normal, network-connected state of operation. Themethod 3500 then proceeds to afinish block 3518 and terminates. At this point, the XML file system of the first client is then synchronized to the server-side component 2500 of the network operating system and is online. - XML File System Special Folders
- As discussed above, certain folders in the
XML file system 2500 may be designated as special folders. In one embodiment, an entry for a special folder is stored in thefolder database 2520 in the same way as an entry for a regular folder, but with a flag set to indicate that the folder is a special folder. In one embodiment, the entry in thefolder database 2520 for the special folder also contains an indication of one of many server process that handles requests to create files in the special folder. In another embodiment, one server process handles all requests to create files in the special folder, and determines how to handle the file based on the content of the file, such as a file type of the file. - These special folders, instead of providing file storage, may serve as an abstraction for some other data handling routine, such as asynchronous messaging between users. One example of such asynchronous messaging would be the use of an outbox folder for receiving and handling outgoing messages intended for other users. The use of special folders for inter-user communication provides many advantages. For example, it simplifies client application development. A
XIOS application 2402 may utilize the messaging protocol associated with the special folder by simply using familiar file creation routines, and need not struggle with the underlying details of the communication protocol. As another example, the use of special folders for inter-user communication allows aXIOS application 2402 to leverage the group functionality included in theXML file system 2500, as described above. Hence, aXIOS application 2402 using special folders for messaging does not need to add extra code for implementing security, group membership, friend lists, addressing, anonymity, or the like, as it may simply rely on the underlying functionality of theXML file system 2500 for such features. -
FIG. 36 illustrates one embodiment of amethod 3600 of handling a request to create a new file in an outbox special folder. While such a request would look to aXIOS application 2402 executing on a client as if it were a request to create a file, the server will treat the request as a request to send a message to a second user. From astart block 3602, themethod 3600 proceeds to block 3604, where a server process associated with an outbox folder of a first user receives a request to create a new file in the outbox special folder. Next, atblock 3606, the server process extracts an address of an intended recipient from the request. Themethod 3600 then proceeds to block 3608, where the server process identifies a second user associated with the address of the intended recipient. - The group and friend list functionality of the
XML file system 2500 described above allows multiple different types of addressing to identify the second user. For example, the first user may address the message directly to a user name of the second user. As another example, the first user may address the message to a membership name that is associated with the second user. In this case, the anonymity of the second user would be protected, but the first user would still be able to address messages to the second user. As yet another example, the first user may address the message to an address stored in the metadata associated with the second user, such as a phone number. The server process will determine which type of addressing has been used, and will identify the second user accordingly. - Next, at
block 3610, the server process determines an inbox folder ID of the second user. In one embodiment, this simply involves searching thefolder database 2520 for an inbox folder associated with the second user. Themethod 3600 then proceeds to block 3612, where, using the inbox folder ID, the server process creates a new file in an inbox folder of the second user, the new file containing the data included in the request. In embodiments where the file has been created in the special folder (as opposed to the server process directly handling the file creation request), the server process simply moves the new file from the outbox folder of the first user to the inbox folder of the second user. Next, themethod 3600 proceeds to anend block 3614 and terminates. - As outlined above, one advantage of the network operating system is that the features embedded in the network operating system make it possible to rapidly develop reusable, scaleable, cross-platform, collaboration components that contain rich security and anonymity functionality. One embodiment of an exemplary application that takes advantage of many of these features is a chat application, described below.
-
FIG. 37 illustrates, at a high level, one embodiment of achat application 3700 and its corresponding shareddata file 3710. Instead of devising and coding new communication protocols and authentication schemes, thechat application 3700 performs communication between participants in a chat conversation through the use of a shareddata file 3710 residing in theXML file system 2500. The interface of thechat application 3700 comprises four primary components: ahost window component 3712, atext display component 3702, atext entry component 3704, and abutton component 3706. Upon the start of a chat conversation, thetext display component 3702 is bound to the shareddata file 3710 via a binding 3708, such that changes made to the shareddata file 3710 by any participant in the chat conversation will be reflected in the text display component 3710 (this text is omitted fromFIG. 37 for clarity). -
FIG. 38 illustrates, at a high level, that thetext display component 3702 and thebutton component 3706 of one embodiment of achat application 3700 are also bound to the shareddata file 3710. When a user inputs text into thetext entry component 3704 and clicks thebutton component 3706, the change is made in the shareddata file 3710. This change will then be propagated to all components bound to the shareddata file 3710, includingtext display component 3702. -
FIG. 39 illustrates, at a high level, the updating of the shareddata file 3710 in a chat conversation between a chat application of afirst user 3902 and a chat application of asecond user 3904. In this figure, thetext display component 3702 of the chat application of thefirst user 3902 and thetext display component 3702 of the chat application of thesecond user 3904 are bound to the shareddata file 3710, and therefore display the contents of the shareddata file 3710. The first user has input text into thetext input component 3704, and has clicked thebutton component 3706. Thebutton component 3706 is associated with a trigger which, when the button component is clicked, causes steps to execute that read the text from thetext entry component 3704, append thetext 3906 to the shareddata file 3710, and clear the text from thetext entry component 3704. - This procedure for updating the shared
data file 3710 helps to show at least one advantage of the network operating system, in that a developer must merely associate the four components described above, and create the rule bound to the text entry component, to enable this functionality. Behind the scenes, the network operating system will handle numerous details of updating the shareddata file 3710. For example, in one embodiment, a cached copy of the shareddata file 3710 is stored in the client-side cache maintained by thedocument manager 912. A corresponding URL object receives the request to update the shareddata file 3710, which causes thetransaction manager 910 to create a transaction representing the changes. Thetransaction manager 910 propagates the transaction to remote listeners by causing the transaction to be submitted to theXML web service 2510 via theXIOS communicator 2504 and the XIOS channel. TheXML web service 2510 notes that the file is shared, and forwards the submitted transaction to thetransaction coordinator 2522. Thetransaction coordinator 2522 then commits the transaction, updating the shareddata file 3710 within theXML file system 2500. -
FIG. 40 illustrates, at a high level, the transmission of the chat messages via propagation of changes to the shareddata file 3710 in one embodiment of thechat application 3700. As described above, thetext display component 3702 of both the chat application of thefirst client 3902 and the chat application of thesecond client 3904 are bound to the shareddata file 3710. Hence, when theXML file system 2500 updates the shareddata file 3710, each of the bound components is notified of the changes and is updated accordingly. - Advantageously, this allows the developer to have UI components that automatically, through data update event propagation, always display the correct information synchronized with the shared
data file 3710, and thereby complete the chat communication without writing any code, but instead by simply binding the component to the shareddata file 3710. As with the update of the shareddata file 3710, the network operating system handles numerous details of this transaction. For example, in one embodiment, when thetransaction coordinator 2522 commits the transaction, it instructs themessage server 2512 to notify each client that is subscribed to changes in the shareddata file 3710 that the shareddata file 3710 has been updated. Themessage server 2512 sends those notifications to each client, which either extracts the updated information from the notification or contacts theXML file system 2500 to obtain the latest version of the file. In this regard, thetransaction manager 910 of the first client will recognize that the changes were submitted by the first client, and will not repetitively update its cached version of the shareddata file 3710. Thetransaction manager 910 of other clients will cause the changes to be incorporated into their respective cached versions of the shareddata file 3710. As occurs with other data updates, any listening components will then be notified that the file has been updated, including thetext display components 3702 of the chat application of thefirst client 3902 and the chat application of thesecond client 3904. Thetext display components 3702 will then automatically be updated accordingly with the addedcontent 3906. -
FIG. 41 illustrates an additional feature enabled by using a shareddata file 3710 for collaborative communication between clients. That is, as updates to a given shareddata file 3710 are propagated to any number of clients subscribing to the shareddata file 3710, no extra work is required to enable collaborative communication between more than two participants. As illustrated inFIG. 41 , the conversation between thefirst client 3902 and thesecond client 3904 can be joined by any number of other clients, such as athird client 4102 and a fourth client 4104, without any further design changes. Each client will bind to the shareddata file 3710 and receive updates as described above. - The addition of contacts to a given user's chat friend list and the establishing of individual chat sessions may also illustrate many features contained within the network operating system. In one embodiment, a first user may only send or receive chat messages from a second user who is a member of a friend list of the first user and who has consented to chat communication with the first user. The friend list of the first user may be stored in a document in the
XML file system 2500, or may be stored and transmitted as part of the settings.xml file. To add a second user to the friend list, the first user must first search for the user. In one embodiment, to preserve anonymity of users when belonging to a group, the first user will only be able to search membership names, each of which is associated with a user and a group to which the first user belongs. In one embodiment, the first user will also be able to search a global group, in which there is an indication of the actual name of the user, but no connection to names found in groups. - In either case, the search will return to the first user an address associated with the second user. The first user will then send a request to the address of the second user to add the second user to the first user's friend list. In one embodiment, this is done using a method similar to the
method 3600 described above, wherein the first user creates a file in the first user's outbox folder that constitutes the friend list request, which is then routed and transferred to the second user's inbox folder by a server process. On the client of the second user, the request is retrieved from the inbox of the second user, and a dialog is displayed asking the second user whether or not she wishes to allow the first user to add her to his friend list. When the second user responds, a message is sent back to the first user in similar fashion to complete the addition of the second user to the friend list of the first user, and the first user will then be able to start chat conversations with the second user. - For a first user to start a chat session with a second user, a similar process occurs. The chat application of the first user creates a shared
data file 3710, binds itstext display component 3702 to the shareddata file 3710, and sends a request to the address of the second user to begin a chat session. The request is delivered as described above. If the second user accepts the request, a notification is sent to the chat application of the first user, which then sends the document ID of the shareddata file 3710 to the chat application of the second user. The chat application of the second user binds itstext display component 3702 to the shareddata file 3710, and the chat conversation may proceed as described above. - Although these features are described with relation to chat, one skilled in the art will recognize that other forms of server-mediated communication, such as message boards, email, and the like, could be implemented utilizing shared data files. Also, shared data files could be used to coordinate other forms of communication that do not require a server for mediation. For example, a first user and a second user could use a shared data file to negotiate bandwidth settings, encryption settings, and the like for peer-to-peer communication, such as VOIP or video conferencing.
- Further, although the description of chat above assumes that the chat application is handling all messages that arrive in the inbox folder for the sake of simplicity, it is possible that an additional component on the client manages incoming messages. In one embodiment, a component on the client analyzes each message that appears in the inbox folder, and determines an appropriate application for handling the message. The component then launches the application and passes the message to the application for further processing. In this way, incoming chat requests or buddy list requests could be handled without having the chat application already running.
-
FIG. 42 illustrates another advantage of the use of reusable components in creating XIOS applications. The figure illustrates one embodiment of the network operating system hosted within a web browser, and may also be representative of how the network operating system may look in other embodiments, such as a stand-alone application or a machine operating system implementation of the client-side component 2400. Each of the boxes within the web browser represents aXIOS application 2402 created with reusable components, such as an email component, a clock component, a web search component, a group message component, and a weather report component. The box in the lower right shows the reuse of the chat application components within this web browser, as opposed to merely within a stand-alone chat application. The use of reusable components allows rapid development of such composite applications, as the components need not be rewritten to work within a different context. Another advantage of being able to create composite applications is that underlying data that feed the applications from data models may be merged from multiple disparate sources, and hence enable applications to work from a composite of a multitude of data sources. -
FIG. 43 illustrates an example collaboration application easily created using embodiments of the system. The Class of 1992 Reunion application is one example of functionality that could be presented to members of a group. As described above with respect toFIG. 42 ,FIG. 43 illustrates a collection of components that refer to multiple data sources. What is illustrated by the Class of 1992 Reunion application is a collection of components that could be launched as part of an autostart.xml file loaded when binding a group folder. As shown above inFIG. 32B , the Class of 1992 Reunion group folder may be bound by a client as a data source, in which case it would be displayed as a drive within the user interface. When a user thereafter opens that data source (or when the user first binds the data source), an autostart.xml document associated with the group folder will cause the collection of components, such as the Schedule of Events, the Map to Reunion Events, the Countdown to Reunion, etc., to be displayed. - Along with the automatic display of these components, the group functionality will also provide security. For example, only members of the group will be able to view entries in the Photo Album, which may simply be a view of a folder stored within the group folder hierarchy. The group functionality will also provide easy collaboration with other members of the group, as shown in the Chat component of
FIG. 43 , which shows other online members of the group without first requiring the user to add the other group members to a friend list. - While illustrative embodiments have been illustrated and described, it will be appreciated that various changes can be made therein without departing from the spirit and scope of the invention.
Claims (20)
1. A nontransitory computer-readable medium having computer-executable instructions stored thereon that, in response to execution by one or more processors of a client computing device, cause the computing device to open an application package containing an application's process and view logic, by:
obtaining resources of an application being opened as specified in a corresponding application package on the client computing device, the application defined in the application package having separately defined process and view logic;
instantiating an instance object that associates process and view objects to a particular application instance and tracks a runtime state of the application during execution, and wherein potentially multiple instances of the application execute concurrently on the client computing device;
re-creating a previous runtime state of the application within the instance object using data provided with the application package indicating the previous runtime state; and
executing the application's process and view logic relative to the appropriate application instance including using the instance object to provide context of the runtime state in executing application logic.
2. The computer-readable medium as recited in claim 1 , wherein obtaining resources of an application being opened includes:
evaluating an XML-based expression having a URL that references at least one resource of the application; and
checking resources currently maintained in a client-side cache to determine whether at least one application resource is available locally.
3. The computer-readable medium as recited in claim 1 , wherein a number of application instances that can be instantiated is limited to a number specified in the application package.
4. The computer-readable medium as recited in claim 1 , wherein obtaining resources of an application being opened as specified in a corresponding application package includes instantiating an application object configured to hold multiple instance objects.
5. The computer-readable medium as recited in claim 1 , wherein obtaining resources of an application being opened includes:
determining whether a primary network location that stores the resources is accessible; and
if the resources are not available from the primary network location, utilizing semantic logic in the application package to identify a secondary network location.
6. The computer-readable medium as recited in claim 1 , wherein resources obtained as specified in the application package include at least one resource selected from an image, XML document, and binary file.
7. The computer-readable medium as recited in claim 1 , wherein the instance object is configured to track at least one object in the view layer and at least one object in the controller layer associated with an application that adheres to the MVC design paradigm.
8. The computer-readable medium as recited in claim 1 , wherein the instance object holds a local expression engine and causes expressions referencing named objects that are global to the application to be evaluated relative to the appropriate application instance.
9. The computer-readable medium as recited in claim 1 , wherein the data provided with the application package describing the previous runtime state includes data serialized in XML.
10. The computer-readable medium as recited in claim 1 , wherein to initiate execution of an application's process and view logic includes utilizing a data type recognizer to identify a document type from semantic data in the application package and cause actions to be performed that are based on the identified document type.
11. The computer-readable medium as recited in claim 1 , wherein the data provided with the application package indicating the previous runtime state includes a reference to an XML document that describes the previous runtime state.
12. The computer-readable medium as recited in claim 1 , wherein the data provided with the application package indicating the previous runtime state includes XML data that describes the previous runtime state within the application package.
13. A client computing device configured to open an application package containing an application's process and view logic by:
obtaining resources of an application being opened as specified in a corresponding application package on the client computing device, the application defined in the application package having separately defined process and view logic;
instantiating an instance object that associates process and view objects to a particular application instance and tracks a runtime state of the application during execution, and wherein potentially multiple instances of the application execute concurrently on the client computing device;
re-creating a previous runtime state of the application within the instance object using data provided with the application package indicating the previous runtime state; and
executing the application's process and view logic relative to the appropriate application instance including using the instance object to provide context of the runtime state in executing application logic.
14. The computer-readable medium as recited in claim 13 , wherein obtaining resources of an application being opened includes:
evaluating an XML-based expression having a URL that references at least one resource of the application; and
checking resources currently maintained in a client-side cache to determine whether at least one application resource is available locally.
15. The computer-readable medium as recited in claim 13 , wherein obtaining resources of an application being opened as specified in a corresponding application package includes instantiating an application object configured to hold multiple instance objects.
16. The computer-readable medium as recited in claim 13 , wherein resources obtained as specified in the application package include at least one resource selected from an image, XML document, and binary file.
17. The computer-readable medium as recited in claim 13 , wherein the instance object is configured to track at least one object in the view layer and at least one object in the controller layer associated with an application that adheres to the MVC design paradigm.
18. The computer-readable medium as recited in claim 13 , wherein the instance object holds a local expression engine and causes expressions referencing named objects that are global to the application to be evaluated relative to the appropriate application instance.
19. The computer-readable medium as recited in claim 13 , wherein the data provided with the application package indicating the previous runtime state includes a reference to an XML document that describes the previous runtime state.
20. The computer-readable medium as recited in claim 13 , wherein the data provided with the application package indicating the previous runtime state includes XML data that describes the previous runtime state within the application package.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/754,512 US20160028808A1 (en) | 2007-09-28 | 2015-06-29 | Network operating system |
US17/156,430 US11838358B2 (en) | 2007-09-28 | 2021-01-22 | Network operating system |
US18/486,031 US20240223653A1 (en) | 2007-09-28 | 2023-10-12 | Network operating system |
Applications Claiming Priority (23)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US97632507P | 2007-09-28 | 2007-09-28 | |
US97621607P | 2007-09-28 | 2007-09-28 | |
US97632007P | 2007-09-28 | 2007-09-28 | |
US97625807P | 2007-09-28 | 2007-09-28 | |
US97628107P | 2007-09-28 | 2007-09-28 | |
US97626907P | 2007-09-28 | 2007-09-28 | |
US97624607P | 2007-09-28 | 2007-09-28 | |
US97625207P | 2007-09-28 | 2007-09-28 | |
US97630807P | 2007-09-28 | 2007-09-28 | |
US97622207P | 2007-09-28 | 2007-09-28 | |
US97631207P | 2007-09-28 | 2007-09-28 | |
US97633907P | 2007-09-28 | 2007-09-28 | |
US97631107P | 2007-09-28 | 2007-09-28 | |
US97630407P | 2007-09-28 | 2007-09-28 | |
US97629207P | 2007-09-28 | 2007-09-28 | |
US97632707P | 2007-09-28 | 2007-09-28 | |
US97630107P | 2007-09-28 | 2007-09-28 | |
US97626607P | 2007-09-28 | 2007-09-28 | |
US97624907P | 2007-09-28 | 2007-09-28 | |
US97627507P | 2007-09-28 | 2007-09-28 | |
US97628307P | 2007-09-28 | 2007-09-28 | |
US12/240,888 US9071623B2 (en) | 2007-09-28 | 2008-09-29 | Real-time data sharing |
US14/754,512 US20160028808A1 (en) | 2007-09-28 | 2015-06-29 | Network operating system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/240,888 Continuation US9071623B2 (en) | 2007-09-28 | 2008-09-29 | Real-time data sharing |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/156,430 Continuation US11838358B2 (en) | 2007-09-28 | 2021-01-22 | Network operating system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160028808A1 true US20160028808A1 (en) | 2016-01-28 |
Family
ID=40512130
Family Applications (24)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/240,812 Active 2030-07-15 US8688627B2 (en) | 2007-09-28 | 2008-09-29 | Transaction propagation in a networking environment |
US12/240,915 Active 2029-05-02 US8280925B2 (en) | 2007-09-28 | 2008-09-29 | Resolution of multi-instance application execution |
US12/240,883 Active US8615531B2 (en) | 2007-09-28 | 2008-09-29 | Programmatic data manipulation |
US12/240,841 Active 2031-03-03 US8843942B2 (en) | 2007-09-28 | 2008-09-29 | Interpreting semantic application code |
US12/240,897 Active 2028-12-06 US8234315B2 (en) | 2007-09-28 | 2008-09-29 | Data source abstraction system and method |
US12/240,866 Active US8239511B2 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,871 Active US8959123B2 (en) | 2007-09-28 | 2008-09-29 | User interface framework |
US12/240,854 Active US8954526B2 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,901 Abandoned US20090193410A1 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,888 Active US9071623B2 (en) | 2007-09-28 | 2008-09-29 | Real-time data sharing |
US12/240,902 Active US8099671B2 (en) | 2007-09-28 | 2008-09-29 | Opening an application view |
US12/240,898 Active 2033-11-27 US9344497B2 (en) | 2007-09-28 | 2008-09-29 | State management of applications and data |
US12/240,869 Abandoned US20090172715A1 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,820 Active 2033-01-06 US9621649B2 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,884 Active 2028-11-10 US8156146B2 (en) | 2007-09-28 | 2008-09-29 | Network file system |
US12/240,786 Active US8108426B2 (en) | 2007-09-28 | 2008-09-29 | Application and file system hosting framework |
US12/240,836 Active US8996459B2 (en) | 2007-09-28 | 2008-09-29 | Offline and/or client-side execution of a network application |
US12/240,922 Active 2028-11-20 US8112460B2 (en) | 2007-09-28 | 2008-09-29 | Framework for applying rules |
US12/240,759 Active US8620863B2 (en) | 2007-09-28 | 2008-09-29 | Message passing in a collaborative environment |
US12/240,877 Abandoned US20090158142A1 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,900 Active US8738567B2 (en) | 2007-09-28 | 2008-09-29 | Network file system with enhanced collaboration features |
US14/754,512 Abandoned US20160028808A1 (en) | 2007-09-28 | 2015-06-29 | Network operating system |
US17/156,430 Active 2029-07-10 US11838358B2 (en) | 2007-09-28 | 2021-01-22 | Network operating system |
US18/486,031 Pending US20240223653A1 (en) | 2007-09-28 | 2023-10-12 | Network operating system |
Family Applications Before (21)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/240,812 Active 2030-07-15 US8688627B2 (en) | 2007-09-28 | 2008-09-29 | Transaction propagation in a networking environment |
US12/240,915 Active 2029-05-02 US8280925B2 (en) | 2007-09-28 | 2008-09-29 | Resolution of multi-instance application execution |
US12/240,883 Active US8615531B2 (en) | 2007-09-28 | 2008-09-29 | Programmatic data manipulation |
US12/240,841 Active 2031-03-03 US8843942B2 (en) | 2007-09-28 | 2008-09-29 | Interpreting semantic application code |
US12/240,897 Active 2028-12-06 US8234315B2 (en) | 2007-09-28 | 2008-09-29 | Data source abstraction system and method |
US12/240,866 Active US8239511B2 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,871 Active US8959123B2 (en) | 2007-09-28 | 2008-09-29 | User interface framework |
US12/240,854 Active US8954526B2 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,901 Abandoned US20090193410A1 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,888 Active US9071623B2 (en) | 2007-09-28 | 2008-09-29 | Real-time data sharing |
US12/240,902 Active US8099671B2 (en) | 2007-09-28 | 2008-09-29 | Opening an application view |
US12/240,898 Active 2033-11-27 US9344497B2 (en) | 2007-09-28 | 2008-09-29 | State management of applications and data |
US12/240,869 Abandoned US20090172715A1 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,820 Active 2033-01-06 US9621649B2 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,884 Active 2028-11-10 US8156146B2 (en) | 2007-09-28 | 2008-09-29 | Network file system |
US12/240,786 Active US8108426B2 (en) | 2007-09-28 | 2008-09-29 | Application and file system hosting framework |
US12/240,836 Active US8996459B2 (en) | 2007-09-28 | 2008-09-29 | Offline and/or client-side execution of a network application |
US12/240,922 Active 2028-11-20 US8112460B2 (en) | 2007-09-28 | 2008-09-29 | Framework for applying rules |
US12/240,759 Active US8620863B2 (en) | 2007-09-28 | 2008-09-29 | Message passing in a collaborative environment |
US12/240,877 Abandoned US20090158142A1 (en) | 2007-09-28 | 2008-09-29 | Network operating system |
US12/240,900 Active US8738567B2 (en) | 2007-09-28 | 2008-09-29 | Network file system with enhanced collaboration features |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/156,430 Active 2029-07-10 US11838358B2 (en) | 2007-09-28 | 2021-01-22 | Network operating system |
US18/486,031 Pending US20240223653A1 (en) | 2007-09-28 | 2023-10-12 | Network operating system |
Country Status (5)
Country | Link |
---|---|
US (24) | US8688627B2 (en) |
EP (4) | EP2206048A4 (en) |
KR (5) | KR20100091165A (en) |
BR (4) | BRPI0818194A2 (en) |
WO (5) | WO2009043030A2 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020243420A1 (en) * | 2019-05-29 | 2020-12-03 | TADA Cognitive Solutions, LLC | Digital duplicate |
US10909160B2 (en) | 2019-05-29 | 2021-02-02 | TADA Cognitive Solutions, LLC | Digital duplicate |
US11163613B2 (en) | 2019-07-23 | 2021-11-02 | International Business Machines Corporation | Automated system integration |
US11301573B2 (en) | 2019-08-19 | 2022-04-12 | TADA Cognitive Solutions, LLC | Data security using semantic services |
US11461293B2 (en) | 2019-08-19 | 2022-10-04 | TADA Cognitive Solutions, LLC | Processes and systems for onboarding data for a digital duplicate |
US11580479B2 (en) | 2020-09-04 | 2023-02-14 | TADA Cognitive Solutions, LLC | Master network techniques for a digital duplicate |
Families Citing this family (413)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8966498B2 (en) | 2008-01-24 | 2015-02-24 | Oracle International Corporation | Integrating operational and business support systems with a service delivery platform |
US9565297B2 (en) | 2004-05-28 | 2017-02-07 | Oracle International Corporation | True convergence with end to end identity management |
US9038082B2 (en) * | 2004-05-28 | 2015-05-19 | Oracle International Corporation | Resource abstraction via enabler and metadata |
US9245236B2 (en) | 2006-02-16 | 2016-01-26 | Oracle International Corporation | Factorization of concerns to build a SDP (service delivery platform) |
US8332526B2 (en) | 2005-05-25 | 2012-12-11 | Microsoft Corporation | Data communication protocol including negotiation and command compounding |
US8914493B2 (en) | 2008-03-10 | 2014-12-16 | Oracle International Corporation | Presence-based event driven architecture |
US8539473B2 (en) * | 2007-01-30 | 2013-09-17 | Microsoft Corporation | Techniques for providing information regarding software components for a user-defined context |
CN101267445B (en) * | 2007-03-12 | 2013-04-17 | 华为技术有限公司 | A WEB service realization system, device and method |
WO2009043030A2 (en) | 2007-09-28 | 2009-04-02 | Xcerion Aktiebolag | Network operating system |
US8230353B2 (en) * | 2007-10-11 | 2012-07-24 | Oracle America, Inc. | Iterative development of services from WSDL |
US9009603B2 (en) | 2007-10-24 | 2015-04-14 | Social Communications Company | Web browser interface for spatial communication environments |
US9357025B2 (en) | 2007-10-24 | 2016-05-31 | Social Communications Company | Virtual area based telephony communications |
US8036980B2 (en) * | 2007-10-24 | 2011-10-11 | Thomson Reuters Global Resources | Method and system of generating audit procedures and forms |
US8050988B2 (en) * | 2007-10-24 | 2011-11-01 | Thomson Reuters Global Resources | Method and system of generating audit procedures and forms |
JP2009123022A (en) * | 2007-11-15 | 2009-06-04 | Canon Inc | Document management apparatus, document management method, program and storage medium |
US8326814B2 (en) | 2007-12-05 | 2012-12-04 | Box, Inc. | Web-based file management system and service |
US9654515B2 (en) | 2008-01-23 | 2017-05-16 | Oracle International Corporation | Service oriented architecture-based SCIM platform |
US9003059B2 (en) * | 2008-03-31 | 2015-04-07 | Microsoft Technology Licensing, Llc | Running applications in an online or offline mode based on the availability of the connection to the remote web server |
US9235909B2 (en) | 2008-05-06 | 2016-01-12 | International Business Machines Corporation | Simplifying the presentation of a visually complex semantic model within a graphical modeling application |
US9002984B2 (en) * | 2008-06-17 | 2015-04-07 | Go Daddy Operating Company, LLC | Direct domain software and file access computer system |
US20090313363A1 (en) * | 2008-06-17 | 2009-12-17 | The Go Daddy Group, Inc. | Hosting a remote computer in a hosting data center |
US8589474B2 (en) * | 2008-06-17 | 2013-11-19 | Go Daddy Operating Company, LLC | Systems and methods for software and file access via a domain name |
US9002985B2 (en) * | 2008-06-17 | 2015-04-07 | Go Daddy Operating Company, LLC | Branded and comarketed domain-based thick client system |
US20090327238A1 (en) * | 2008-06-28 | 2009-12-31 | Microsoft Corporation | Extensible binding of data within graphical rich applications |
US20100023955A1 (en) * | 2008-07-28 | 2010-01-28 | Marcottage | Method and system and apparatus for dynamic software environment |
US8291378B2 (en) * | 2008-07-29 | 2012-10-16 | International Business Machines Corporation | Simplified deployment modeling |
US8849987B2 (en) * | 2008-07-29 | 2014-09-30 | International Business Machines Corporation | Automated discovery of a topology of a distributed computing environment |
DE102008035601A1 (en) * | 2008-07-31 | 2010-02-04 | Walter, Thomas, Dr.-Ing. | System for managing files |
US8505067B2 (en) | 2008-08-21 | 2013-08-06 | Oracle International Corporation | Service level network quality of service policy enforcement |
US8302093B2 (en) * | 2008-08-28 | 2012-10-30 | International Business Machines Corporation | Automated deployment of defined topology in distributed computing environment |
US8793652B2 (en) | 2012-06-07 | 2014-07-29 | International Business Machines Corporation | Designing and cross-configuring software |
US8417658B2 (en) | 2008-09-12 | 2013-04-09 | International Business Machines Corporation | Deployment pattern realization with models of computing environments |
US9280335B2 (en) | 2010-09-30 | 2016-03-08 | International Business Machines Corporation | Semantically rich composable software image bundles |
US8402381B2 (en) | 2008-09-23 | 2013-03-19 | International Business Machines Corporation | Automatically arranging widgets of a model within a canvas using iterative region based widget relative adjustments |
WO2010037201A1 (en) | 2008-09-30 | 2010-04-08 | Wicksoft Corporation | System and method for secure management of mobile user access to enterprise network resources |
US8490052B2 (en) * | 2008-10-14 | 2013-07-16 | Microsoft Corporation | Declarative programming model for authoring and execution control and data flow for resource oriented system |
US8533666B2 (en) * | 2008-10-17 | 2013-09-10 | Microsoft Corporation | Interactive design environments to visually model, debug and execute resource oriented programs |
US9015593B2 (en) * | 2008-12-01 | 2015-04-21 | International Business Machines Corporation | Managing advisories for complex model nodes in a graphical modeling application |
US20100198872A1 (en) * | 2009-01-25 | 2010-08-05 | Thomas Norwin Walter | System for the Management of Files |
JP5166318B2 (en) * | 2009-02-24 | 2013-03-21 | 株式会社東芝 | Apparatus, method and program for processing information |
US9087066B2 (en) * | 2009-04-24 | 2015-07-21 | Swish Data Corporation | Virtual disk from network shares and file servers |
US9239840B1 (en) | 2009-04-24 | 2016-01-19 | Swish Data Corporation | Backup media conversion via intelligent virtual appliance adapter |
CN101561748A (en) * | 2009-05-21 | 2009-10-21 | 阿里巴巴集团控股有限公司 | Display method and Display device of the tag detail in IM software |
US7953896B2 (en) * | 2009-05-27 | 2011-05-31 | Microsoft Corporation | Managing user accounts and groups in multiple forests |
US8375251B2 (en) * | 2009-06-11 | 2013-02-12 | Microsoft Corporation | Monitoring and healing a computing system |
JP5159711B2 (en) * | 2009-06-25 | 2013-03-13 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Embedded device and its status display control method |
US8799203B2 (en) * | 2009-07-16 | 2014-08-05 | International Business Machines Corporation | Method and system for encapsulation and re-use of models |
US8200710B2 (en) * | 2009-07-28 | 2012-06-12 | Sap Ag | System and method for runtime rendering of web-based user interfaces for master data management |
US20110040793A1 (en) * | 2009-08-12 | 2011-02-17 | Mark Davidson | Administration Groups |
US8341214B2 (en) * | 2009-08-12 | 2012-12-25 | Xerox Corporation | System and method for communicating with a network of printers using a mobile device |
US9508049B2 (en) * | 2009-08-30 | 2016-11-29 | Hewlett-Packard Development Company, L.P. | Update-triggered document-defined workflow |
US8266125B2 (en) * | 2009-10-01 | 2012-09-11 | Starcounter Ab | Systems and methods for managing databases |
US9965453B2 (en) * | 2009-10-15 | 2018-05-08 | Microsoft Technology Licensing, Llc | Document transformation |
US20110090236A1 (en) * | 2009-10-15 | 2011-04-21 | Microsoft Corporation | Graphic Object Data Binding |
KR101610830B1 (en) * | 2009-11-05 | 2016-04-11 | 삼성전자주식회사 | Apparatus and Method for executing application |
DE102009054114A1 (en) * | 2009-11-20 | 2011-05-26 | Siemens Aktiengesellschaft | Method and device for accessing control data according to provided rights information |
US9269060B2 (en) | 2009-11-20 | 2016-02-23 | Oracle International Corporation | Methods and systems for generating metadata describing dependencies for composable elements |
TWM381231U (en) * | 2009-12-01 | 2010-05-21 | Inxtron Inc | Network device for remote firmware update |
US20110137991A1 (en) * | 2009-12-01 | 2011-06-09 | Lester Paul Russell | Systems and methods for management and collaboration in a private network |
US9098507B2 (en) | 2009-12-03 | 2015-08-04 | At&T Intellectual Property I, L.P. | Dynamic content presentation |
US9503407B2 (en) | 2009-12-16 | 2016-11-22 | Oracle International Corporation | Message forwarding |
US9509790B2 (en) | 2009-12-16 | 2016-11-29 | Oracle International Corporation | Global presence |
US8495746B2 (en) * | 2009-12-18 | 2013-07-23 | Verizon Patent And Licensing Inc. | Apparatuses, methods and systems of an application security management platform |
US9088580B2 (en) * | 2009-12-31 | 2015-07-21 | Microsoft Technology Licensing, Llc | Access control based on user and service |
US8997053B2 (en) | 2010-01-14 | 2015-03-31 | Worksoft, Inc. | System and method for automated testing of software applications with dynamic user interfaces spanning multiple technologies |
US8346935B2 (en) * | 2010-01-15 | 2013-01-01 | Joyent, Inc. | Managing hardware resources by sending messages amongst servers in a data center |
US9715332B1 (en) | 2010-08-26 | 2017-07-25 | Cypress Lake Software, Inc. | Methods, systems, and computer program products for navigating between visual components |
US8780130B2 (en) * | 2010-11-30 | 2014-07-15 | Sitting Man, Llc | Methods, systems, and computer program products for binding attributes between visual components |
US10397639B1 (en) | 2010-01-29 | 2019-08-27 | Sitting Man, Llc | Hot key systems and methods |
US8892677B1 (en) * | 2010-01-29 | 2014-11-18 | Google Inc. | Manipulating objects in hosted storage |
US9443227B2 (en) * | 2010-02-16 | 2016-09-13 | Tigertext, Inc. | Messaging system apparatuses circuits and methods of operation thereof |
US8504400B2 (en) | 2010-03-24 | 2013-08-06 | International Business Machines Corporation | Dynamically optimized distributed cloud computing-based business process management (BPM) system |
US20110239117A1 (en) * | 2010-03-25 | 2011-09-29 | Microsoft Corporation | Natural User Interaction in Shared Resource Computing Environment |
US20110239133A1 (en) * | 2010-03-29 | 2011-09-29 | Microsoft Corporation | Shared resource computing collaboration sessions management |
US20110258538A1 (en) * | 2010-03-31 | 2011-10-20 | Heng Liu | Capturing DOM Modifications Mediated by Decoupled Change Mechanism |
US8892628B2 (en) | 2010-04-01 | 2014-11-18 | Microsoft Corporation | Administrative interface for managing shared resources |
US8627426B2 (en) * | 2010-04-26 | 2014-01-07 | Vmware, Inc. | Cloud platform architecture |
US8719223B2 (en) | 2010-05-06 | 2014-05-06 | Go Daddy Operating Company, LLC | Cloud storage solution for reading and writing files |
US9356991B2 (en) | 2010-05-10 | 2016-05-31 | Litera Technology Llc | Systems and methods for a bidirectional multi-function communication module |
US9122691B2 (en) * | 2010-05-13 | 2015-09-01 | International Business Machines Corporation | System and method for remote file search integrated with network installable file system |
US8572029B2 (en) * | 2010-05-31 | 2013-10-29 | Salesforce.Com, Inc. | Methods and systems for synchronizing data in a multi-tenant database environment |
US20110296043A1 (en) * | 2010-06-01 | 2011-12-01 | Microsoft Corporation | Managing Shared Sessions in a Shared Resource Computing Environment |
EP2580671B1 (en) * | 2010-06-11 | 2015-04-22 | Hewlett-Packard Development Company, L.P. | Http-based client-server communication system and method |
US8443292B2 (en) | 2010-06-11 | 2013-05-14 | Hewlett-Packard Development Company, L.P. | Scripting application with privacy mode coordination |
US8700723B2 (en) * | 2010-06-15 | 2014-04-15 | Netzyn, Inc. | Hierarchical display-server system and method |
WO2011160139A1 (en) | 2010-06-18 | 2011-12-22 | Sweetlabs, Inc. | Systems and methods for integration of an application runtime environment into a user computing environment |
US20130117275A1 (en) * | 2010-07-16 | 2013-05-09 | Nec Corporation | Index monitoring system, index monitoring method and program |
TW201205257A (en) * | 2010-07-19 | 2012-02-01 | Hon Hai Prec Ind Co Ltd | Power adjusting circuit, motherboard including the circuit, and method for the motherboard |
US9001050B2 (en) * | 2010-07-19 | 2015-04-07 | Red Hat Israel, Ltd. | Touch screen emulation for a virtual machine |
US8881056B2 (en) * | 2010-08-30 | 2014-11-04 | Sap Se | Dynamic view computation and display |
US9645839B2 (en) | 2010-10-27 | 2017-05-09 | Microsoft Technology Licensing, Llc | Stateful applications operating in a stateless cloud computing environment |
US8484465B1 (en) * | 2010-12-08 | 2013-07-09 | Google Inc. | Heterogeneous virtual machines sharing a security model |
US8631277B2 (en) | 2010-12-10 | 2014-01-14 | Microsoft Corporation | Providing transparent failover in a file system |
US8429124B2 (en) * | 2010-12-21 | 2013-04-23 | Neustar Information Services, Inc. | On demand multi-location large database synchronization system |
GB2500356A (en) | 2011-01-20 | 2013-09-18 | Box Inc | Real time notification of activities that occur in a web-based collaboration environment |
JP5652228B2 (en) * | 2011-01-25 | 2015-01-14 | 富士通株式会社 | Database server device, database update method, and database update program |
CN102184715B (en) * | 2011-01-30 | 2012-11-28 | 广东佳和通信技术有限公司 | Screen refreshing device and method based on syncretic communication terminal |
US8555276B2 (en) | 2011-03-11 | 2013-10-08 | Joyent, Inc. | Systems and methods for transparently optimizing workloads |
GB2489463A (en) | 2011-03-29 | 2012-10-03 | Gm Global Tech Operations Inc | Method of controlling fuel injection in a common rail engine |
US9569771B2 (en) | 2011-04-29 | 2017-02-14 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
US9361479B2 (en) | 2011-04-29 | 2016-06-07 | Stephen Lesavich | Method and system for electronic content storage and retrieval using Galois fields and geometric shapes on cloud computing networks |
US9037564B2 (en) | 2011-04-29 | 2015-05-19 | Stephen Lesavich | Method and system for electronic content storage and retrieval with galois fields on cloud computing networks |
US9137250B2 (en) | 2011-04-29 | 2015-09-15 | Stephen Lesavich | Method and system for electronic content storage and retrieval using galois fields and information entropy on cloud computing networks |
KR101272077B1 (en) * | 2011-05-16 | 2013-06-12 | 에스케이텔레콤 주식회사 | System and method for providing push service |
US9015601B2 (en) | 2011-06-21 | 2015-04-21 | Box, Inc. | Batch uploading of content to a web-based collaboration environment |
KR101852815B1 (en) * | 2011-06-21 | 2018-06-04 | 엘지전자 주식회사 | Client and server terminals and method for controlling the same |
US9063912B2 (en) | 2011-06-22 | 2015-06-23 | Box, Inc. | Multimedia content preview rendering in a cloud content management system |
US9331955B2 (en) | 2011-06-29 | 2016-05-03 | Microsoft Technology Licensing, Llc | Transporting operations of arbitrary size over remote direct memory access |
US8856582B2 (en) | 2011-06-30 | 2014-10-07 | Microsoft Corporation | Transparent failover |
US9489396B2 (en) | 2011-07-01 | 2016-11-08 | V3 Systems Holdings, Inc. | Intermediation of hypervisor file system and storage device models |
US9652741B2 (en) | 2011-07-08 | 2017-05-16 | Box, Inc. | Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof |
GB2503625A (en) | 2011-07-08 | 2014-01-01 | Box Inc | Collaboration sessions in a workspace on cloud-based content management system |
US9229934B2 (en) * | 2011-07-12 | 2016-01-05 | Salesforce.Com, Inc. | Method and system for document integration |
EP2737450A4 (en) * | 2011-07-29 | 2015-04-01 | Hsbc Technology & Services Usa Inc | Systems and methods for global transfers |
US9411970B2 (en) * | 2011-08-19 | 2016-08-09 | Microsoft Technology Licensing, Llc | Sealing secret data with a policy that includes a sensor-based constraint |
US9432454B2 (en) | 2011-08-29 | 2016-08-30 | At&T Intellectual Property I, L.P. | Cloud-to-cloud peering |
US8855017B2 (en) * | 2011-09-07 | 2014-10-07 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method of building an infrastructure for a virtual network |
US20130067095A1 (en) | 2011-09-09 | 2013-03-14 | Microsoft Corporation | Smb2 scaleout |
US8788579B2 (en) | 2011-09-09 | 2014-07-22 | Microsoft Corporation | Clustered client failover |
CN102999347B (en) * | 2011-09-15 | 2015-07-29 | 腾讯科技(深圳)有限公司 | A kind of system reloading method, system and client |
US20130073692A1 (en) * | 2011-09-15 | 2013-03-21 | Ibromed Corporation | Systems and methods for receiver-controlled data distribution |
KR101350661B1 (en) * | 2011-09-30 | 2014-01-10 | 엔에이치엔엔터테인먼트 주식회사 | Apparatus and method for executing hybrid application using web technology |
US8515902B2 (en) | 2011-10-14 | 2013-08-20 | Box, Inc. | Automatic and semi-automatic tagging features of work items in a shared workspace for metadata tracking in a cloud-based content management system with selective or optional user contribution |
WO2013062599A1 (en) | 2011-10-26 | 2013-05-02 | Box, Inc. | Enhanced multimedia content preview rendering in a cloud content management system |
US9098474B2 (en) | 2011-10-26 | 2015-08-04 | Box, Inc. | Preview pre-generation based on heuristics and algorithmic prediction/assessment of predicted user behavior for enhancement of user experience |
US8990307B2 (en) | 2011-11-16 | 2015-03-24 | Box, Inc. | Resource effective incremental updating of a remote client with events which occurred via a cloud-enabled platform |
US9355115B2 (en) * | 2011-11-21 | 2016-05-31 | Microsoft Technology Licensing, Llc | Client application file access |
GB2500152A (en) | 2011-11-29 | 2013-09-11 | Box Inc | Mobile platform file and folder selection functionalities for offline access and synchronization |
US9019123B2 (en) | 2011-12-22 | 2015-04-28 | Box, Inc. | Health check services for web-based collaboration environments |
US8938712B2 (en) | 2011-12-22 | 2015-01-20 | International Business Machines Corporation | Cross-platform virtual machine and method |
FR2985130A1 (en) * | 2011-12-23 | 2013-06-28 | France Telecom | METHOD FOR SHARING MULTIMEDIA CONTENT BETWEEN AT LEAST ONE FIRST USER AND ONE SECOND USER ON A TELECOMMUNICATIONS NETWORK |
JP5976840B2 (en) * | 2011-12-29 | 2016-08-24 | ヴイエムウェア インコーポレイテッドVMware,Inc. | N-way synchronization of desktop images |
US8547379B2 (en) | 2011-12-29 | 2013-10-01 | Joyent, Inc. | Systems, methods, and media for generating multidimensional heat maps |
US8782224B2 (en) | 2011-12-29 | 2014-07-15 | Joyent, Inc. | Systems and methods for time-based dynamic allocation of resource management |
US8468251B1 (en) | 2011-12-29 | 2013-06-18 | Joyent, Inc. | Dynamic throttling of access to computing resources in multi-tenant systems |
US11232481B2 (en) | 2012-01-30 | 2022-01-25 | Box, Inc. | Extended applications of multimedia content previews in the cloud-based content management system |
US9686212B2 (en) * | 2012-02-08 | 2017-06-20 | Thomson Reuters Global Resources Unlimited Company | Systems, methods and interfaces for using a messaging program across a multiple applications and communications environment |
US11455350B2 (en) | 2012-02-08 | 2022-09-27 | Thomson Reuters Enterprise Centre Gmbh | System, method, and interfaces for work product management |
US9507875B2 (en) * | 2012-02-09 | 2016-11-29 | Fujitsu Limited | Symbolic hyper-graph database |
KR20130097532A (en) * | 2012-02-24 | 2013-09-03 | 한국전자통신연구원 | Apparatus and method for interlocking in heterogeneous network |
JP5929305B2 (en) * | 2012-02-24 | 2016-06-01 | 株式会社リコー | Communication system, server, terminal, program |
US9965745B2 (en) | 2012-02-24 | 2018-05-08 | Box, Inc. | System and method for promoting enterprise adoption of a web-based collaboration environment |
CN102638567B (en) * | 2012-03-02 | 2015-05-20 | 深圳市朗科科技股份有限公司 | Multi-application cloud storage platform and cloud storage terminal |
US9195636B2 (en) | 2012-03-07 | 2015-11-24 | Box, Inc. | Universal file type preview for mobile devices |
US9459990B2 (en) * | 2012-03-27 | 2016-10-04 | International Business Machines Corporation | Automatic and transparent application logging |
US20130262378A1 (en) * | 2012-04-02 | 2013-10-03 | Microsoft Corporation | Aggregation point for enterprise business application binding |
US9054919B2 (en) | 2012-04-05 | 2015-06-09 | Box, Inc. | Device pinning capability for enterprise cloud service and storage accounts |
US20130268868A1 (en) * | 2012-04-10 | 2013-10-10 | Sap Ag | Embedded Communication Facility for Collaborative Business Networks |
US9575981B2 (en) | 2012-04-11 | 2017-02-21 | Box, Inc. | Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system |
US20130275546A1 (en) * | 2012-04-11 | 2013-10-17 | AppSense, Inc. | Systems and methods for the automated migration from enterprise to cloud storage |
US9413587B2 (en) | 2012-05-02 | 2016-08-09 | Box, Inc. | System and method for a third-party application to access content within a cloud-based platform |
US9396216B2 (en) | 2012-05-04 | 2016-07-19 | Box, Inc. | Repository redundancy implementation of a system which incrementally updates clients with events that occurred via a cloud-enabled platform |
US9088463B1 (en) | 2012-05-11 | 2015-07-21 | Amazon Technologies, Inc. | Container contract for data dependencies |
US9691051B2 (en) | 2012-05-21 | 2017-06-27 | Box, Inc. | Security enhancement through application access control |
US9027108B2 (en) | 2012-05-23 | 2015-05-05 | Box, Inc. | Systems and methods for secure file portability between mobile applications on a mobile device |
US8914900B2 (en) | 2012-05-23 | 2014-12-16 | Box, Inc. | Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform |
JP2014010465A (en) | 2012-06-27 | 2014-01-20 | International Business Maschines Corporation | Method for selecting storage cloud for storing entity file from two or more storage cloud and computer and computer program |
US9021099B2 (en) | 2012-07-03 | 2015-04-28 | Box, Inc. | Load balancing secure FTP connections among multiple FTP servers |
US9712510B2 (en) | 2012-07-06 | 2017-07-18 | Box, Inc. | Systems and methods for securely submitting comments among users via external messaging applications in a cloud-based platform |
GB2505072A (en) | 2012-07-06 | 2014-02-19 | Box Inc | Identifying users and collaborators as search results in a cloud-based system |
US9792320B2 (en) | 2012-07-06 | 2017-10-17 | Box, Inc. | System and method for performing shard migration to support functions of a cloud-based service |
US8793669B2 (en) * | 2012-07-17 | 2014-07-29 | Concurix Corporation | Pattern extraction from executable code in message passing environments |
US9237170B2 (en) | 2012-07-19 | 2016-01-12 | Box, Inc. | Data loss prevention (DLP) methods and architectures by a cloud service |
US9378026B2 (en) * | 2012-07-27 | 2016-06-28 | Daniel A. Dooley | Customizable application |
US8868574B2 (en) | 2012-07-30 | 2014-10-21 | Box, Inc. | System and method for advanced search and filtering mechanisms for enterprise administrators in a cloud-based environment |
US9794256B2 (en) | 2012-07-30 | 2017-10-17 | Box, Inc. | System and method for advanced control tools for administrators in a cloud-based service |
US8775917B2 (en) | 2012-08-09 | 2014-07-08 | Sweetlabs, Inc. | Systems and methods for alert management |
US9369520B2 (en) | 2012-08-19 | 2016-06-14 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
US8745267B2 (en) | 2012-08-19 | 2014-06-03 | Box, Inc. | Enhancement of upload and/or download performance based on client and/or server feedback information |
GB2513671A (en) | 2012-08-27 | 2014-11-05 | Box Inc | Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment |
US9081757B2 (en) | 2012-08-28 | 2015-07-14 | Sweetlabs, Inc | Systems and methods for tracking and updating hosted applications |
US8775925B2 (en) * | 2012-08-28 | 2014-07-08 | Sweetlabs, Inc. | Systems and methods for hosted applications |
US9135462B2 (en) | 2012-08-29 | 2015-09-15 | Box, Inc. | Upload and download streaming encryption to/from a cloud-based platform |
US9117087B2 (en) | 2012-09-06 | 2015-08-25 | Box, Inc. | System and method for creating a secure channel for inter-application communication based on intents |
US9311071B2 (en) | 2012-09-06 | 2016-04-12 | Box, Inc. | Force upgrade of a mobile application via a server side configuration file |
US9195519B2 (en) | 2012-09-06 | 2015-11-24 | Box, Inc. | Disabling the self-referential appearance of a mobile application in an intent via a background registration |
US9292833B2 (en) | 2012-09-14 | 2016-03-22 | Box, Inc. | Batching notifications of activities that occur in a web-based collaboration environment |
US9348490B2 (en) * | 2012-09-14 | 2016-05-24 | Ca, Inc. | User interface with configuration, registration, and runtime selection of views |
US10530894B2 (en) * | 2012-09-17 | 2020-01-07 | Exaptive, Inc. | Combinatorial application framework for interoperability and repurposing of code components |
US10200256B2 (en) | 2012-09-17 | 2019-02-05 | Box, Inc. | System and method of a manipulative handle in an interactive mobile user interface |
US9553758B2 (en) | 2012-09-18 | 2017-01-24 | Box, Inc. | Sandboxing individual applications to specific user folders in a cloud-based service |
US10915492B2 (en) | 2012-09-19 | 2021-02-09 | Box, Inc. | Cloud-based platform enabled with media content indexed for text-based searches and/or metadata extraction |
US9959420B2 (en) | 2012-10-02 | 2018-05-01 | Box, Inc. | System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment |
US9495364B2 (en) | 2012-10-04 | 2016-11-15 | Box, Inc. | Enhanced quick search features, low-barrier commenting/interactive features in a collaboration platform |
US9705967B2 (en) | 2012-10-04 | 2017-07-11 | Box, Inc. | Corporate user discovery and identification of recommended collaborators in a cloud platform |
US9665349B2 (en) | 2012-10-05 | 2017-05-30 | Box, Inc. | System and method for generating embeddable widgets which enable access to a cloud-based collaboration platform |
US9069735B2 (en) | 2012-10-15 | 2015-06-30 | Sweetlabs, Inc. | Systems and methods for integrated application platforms |
JP5982343B2 (en) | 2012-10-17 | 2016-08-31 | ボックス インコーポレイテッドBox, Inc. | Remote key management in a cloud-based environment |
US9756022B2 (en) | 2014-08-29 | 2017-09-05 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US9141669B2 (en) | 2013-01-22 | 2015-09-22 | Go Daddy Operating Company, LLC | Configuring an origin server content delivery using a pulled data list |
US9160809B2 (en) | 2012-11-26 | 2015-10-13 | Go Daddy Operating Company, LLC | DNS overriding-based methods of accelerating content delivery |
US10235383B2 (en) | 2012-12-19 | 2019-03-19 | Box, Inc. | Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment |
US9396245B2 (en) | 2013-01-02 | 2016-07-19 | Box, Inc. | Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9953036B2 (en) | 2013-01-09 | 2018-04-24 | Box, Inc. | File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
EP2755151A3 (en) | 2013-01-11 | 2014-09-24 | Box, Inc. | Functionalities, features and user interface of a synchronization client to a cloud-based environment |
US9165046B2 (en) * | 2013-01-15 | 2015-10-20 | Realnetworks, Inc. | Core data synchronization systems and methods |
KR102087395B1 (en) * | 2013-01-16 | 2020-03-10 | 삼성전자주식회사 | Method and apparatus for executing application prograom in an electronic device |
EP2757491A1 (en) | 2013-01-17 | 2014-07-23 | Box, Inc. | Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform |
US9384208B2 (en) | 2013-01-22 | 2016-07-05 | Go Daddy Operating Company, LLC | Configuring a cached website file removal using a pulled data list |
AU2014209663B2 (en) * | 2013-01-24 | 2018-03-08 | Thomson Reuters Enterprise Centre Gmbh | Systems, methods and interfaces for using a messaging program across a multiple applications and communications environment |
US20150161079A1 (en) * | 2013-01-30 | 2015-06-11 | David GROSFELD | File formats and methods for representing documents |
US9438493B2 (en) | 2013-01-31 | 2016-09-06 | Go Daddy Operating Company, LLC | Monitoring network entities via a central monitoring system |
US10977425B1 (en) * | 2013-03-13 | 2021-04-13 | Sprint Communications Company L.P. | Dynamic resource refresh |
US8826279B1 (en) | 2013-03-14 | 2014-09-02 | Joyent, Inc. | Instruction set architecture for compute-based object stores |
US8881279B2 (en) | 2013-03-14 | 2014-11-04 | Joyent, Inc. | Systems and methods for zone-based intrusion detection |
US8943284B2 (en) | 2013-03-14 | 2015-01-27 | Joyent, Inc. | Systems and methods for integrating compute resources in a storage area network |
US8677359B1 (en) | 2013-03-14 | 2014-03-18 | Joyent, Inc. | Compute-centric object stores and methods of use |
US9104456B2 (en) | 2013-03-14 | 2015-08-11 | Joyent, Inc. | Zone management of compute-centric object stores |
US9134962B1 (en) * | 2013-03-15 | 2015-09-15 | Sanctum Solutions, Inc. | Interactive content development |
US8793688B1 (en) | 2013-03-15 | 2014-07-29 | Joyent, Inc. | Systems and methods for double hulled virtualization operations |
US9092238B2 (en) | 2013-03-15 | 2015-07-28 | Joyent, Inc. | Versioning schemes for compute-centric object stores |
US8775485B1 (en) | 2013-03-15 | 2014-07-08 | Joyent, Inc. | Object store management operations within compute-centric object stores |
US9736222B1 (en) * | 2013-04-28 | 2017-08-15 | Amdocs Software Systems Limited | System, method, and computer program for automatically exposing application programming interfaces (APIS) associated with an application server to one or more client devices |
US20140330937A1 (en) * | 2013-05-03 | 2014-11-06 | Microsoft Corporation | End-to-end classification of storage traffic streams |
US10725968B2 (en) | 2013-05-10 | 2020-07-28 | Box, Inc. | Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform |
US10846074B2 (en) * | 2013-05-10 | 2020-11-24 | Box, Inc. | Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client |
US9122657B2 (en) | 2013-05-16 | 2015-09-01 | International Business Machines Corporation | Webpage display system leveraging OSGI |
US9378100B2 (en) | 2013-05-17 | 2016-06-28 | Go Daddy Operating Company, LLC | Tools for storing, accessing and restoring website content via a website repository |
JP2016524494A (en) * | 2013-05-21 | 2016-08-18 | バードナー,スティーブン | System and method for imaging a body part of a patient user |
US9633037B2 (en) | 2013-06-13 | 2017-04-25 | Box, Inc | Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform |
US9805050B2 (en) | 2013-06-21 | 2017-10-31 | Box, Inc. | Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform |
US10229134B2 (en) | 2013-06-25 | 2019-03-12 | Box, Inc. | Systems and methods for managing upgrades, migration of user data and improving performance of a cloud-based platform |
US10110656B2 (en) | 2013-06-25 | 2018-10-23 | Box, Inc. | Systems and methods for providing shell communication in a cloud-based platform |
US9594795B1 (en) * | 2013-06-28 | 2017-03-14 | EMC IP Holding Company LLC | Maintaining data consistency when data is changed out from under another data service |
US9535924B2 (en) | 2013-07-30 | 2017-01-03 | Box, Inc. | Scalability improvement in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform |
US9535909B2 (en) | 2013-09-13 | 2017-01-03 | Box, Inc. | Configurable event-based automation architecture for cloud-based collaboration platforms |
GB2518298A (en) | 2013-09-13 | 2015-03-18 | Box Inc | High-availability architecture for a cloud-based concurrent-access collaboration platform |
US8892679B1 (en) | 2013-09-13 | 2014-11-18 | Box, Inc. | Mobile device, methods and user interfaces thereof in a mobile device platform featuring multifunctional access and engagement in a collaborative environment provided by a cloud-based platform |
US9244615B2 (en) | 2013-09-13 | 2016-01-26 | Microsoft Technology Licensing, Llc | Systems and methods based on policy criteria for controlling the flow of data storage input/output requests between endpoints |
US9704137B2 (en) | 2013-09-13 | 2017-07-11 | Box, Inc. | Simultaneous editing/accessing of content by collaborator invitation through a web-based or mobile application to a cloud-based collaboration platform |
US10509527B2 (en) | 2013-09-13 | 2019-12-17 | Box, Inc. | Systems and methods for configuring event-based automation in cloud-based collaboration platforms |
US9213684B2 (en) | 2013-09-13 | 2015-12-15 | Box, Inc. | System and method for rendering document in web browser or mobile device regardless of third-party plug-in software |
JP6459258B2 (en) * | 2013-09-17 | 2019-01-30 | 株式会社リコー | Information processing apparatus, information processing system, information processing method, and program |
US9785452B2 (en) * | 2013-10-09 | 2017-10-10 | Cisco Technology, Inc. | Framework for dependency management and automatic file load in a network environment |
US10866931B2 (en) | 2013-10-22 | 2020-12-15 | Box, Inc. | Desktop application for accessing a cloud collaboration platform |
US10191765B2 (en) | 2013-11-22 | 2019-01-29 | Sap Se | Transaction commit operations with thread decoupling and grouping of I/O requests |
DE102013225058A1 (en) * | 2013-12-05 | 2015-06-11 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | DEVICE, SYSTEM AND METHOD FOR THE EFFICIENT AND DELIVERABLE SYNCHRONIZATION OF GRAPHIC DATA STRUCTURES |
US9749440B2 (en) | 2013-12-31 | 2017-08-29 | Sweetlabs, Inc. | Systems and methods for hosted application marketplaces |
EP3092609A4 (en) * | 2014-01-07 | 2017-09-13 | Attache Software Australia Pty Limited | Document and object manipulation |
US9426258B1 (en) * | 2014-02-03 | 2016-08-23 | Emc Corporation | Expression based declarative data service execution chaining |
EP2911054A1 (en) * | 2014-02-20 | 2015-08-26 | Siemens Aktiengesellschaft | System for management and processing of data of a medical device |
US9479909B2 (en) | 2014-03-20 | 2016-10-25 | Tigertext, Inc. | Method of sending messages to devices not configured to receive them |
US20150269856A1 (en) * | 2014-03-24 | 2015-09-24 | Guru Labs, L.C. | Virtual classroom management system and interface |
US9306985B1 (en) * | 2014-03-25 | 2016-04-05 | 8X8, Inc. | User configurable data storage |
US9448789B2 (en) * | 2014-04-04 | 2016-09-20 | Avid Technology, Inc. | Method of consolidating, synchronizing, and streaming production content for distributed editing of media compositions |
US10270871B2 (en) | 2014-04-08 | 2019-04-23 | Dropbox, Inc. | Browser display of native application presence and interaction data |
US10171579B2 (en) | 2014-04-08 | 2019-01-01 | Dropbox, Inc. | Managing presence among devices accessing shared and synchronized content |
US10091287B2 (en) * | 2014-04-08 | 2018-10-02 | Dropbox, Inc. | Determining presence in an application accessing shared and synchronized content |
US9501211B2 (en) | 2014-04-17 | 2016-11-22 | GoDaddy Operating Company, LLC | User input processing for allocation of hosting server resources |
US9660933B2 (en) | 2014-04-17 | 2017-05-23 | Go Daddy Operating Company, LLC | Allocating and accessing hosting server resources via continuous resource availability updates |
WO2015175437A1 (en) * | 2014-05-12 | 2015-11-19 | Microsoft Technology Licensing, Llc | Connecting public cloud with private network resources |
US10089098B2 (en) | 2014-05-15 | 2018-10-02 | Sweetlabs, Inc. | Systems and methods for application installation platforms |
US10019247B2 (en) | 2014-05-15 | 2018-07-10 | Sweetlabs, Inc. | Systems and methods for application installation platforms |
US10530854B2 (en) | 2014-05-30 | 2020-01-07 | Box, Inc. | Synchronization of permissioned content in cloud-based environments |
US9602514B2 (en) | 2014-06-16 | 2017-03-21 | Box, Inc. | Enterprise mobility management and verification of a managed application by a content provider |
JP5687380B1 (en) * | 2014-07-16 | 2015-03-18 | ガンホー・オンライン・エンターテイメント株式会社 | Terminal device |
KR101731425B1 (en) * | 2014-08-13 | 2017-04-28 | 에스프린팅솔루션 주식회사 | Cloud system and method for displaying contents thereof |
US10021049B2 (en) | 2014-08-13 | 2018-07-10 | S-Printing Solution Co., Ltd. | Cloud system and method of displaying, by cloud system, content |
US10212110B2 (en) | 2014-08-13 | 2019-02-19 | Hp Printing Korea Co., Ltd. | Cloud system and method of displaying, by cloud system, content |
US10545749B2 (en) | 2014-08-20 | 2020-01-28 | Samsung Electronics Co., Ltd. | System for cloud computing using web components |
US10574442B2 (en) | 2014-08-29 | 2020-02-25 | Box, Inc. | Enhanced remote key management for an enterprise in a cloud-based environment |
US9894119B2 (en) | 2014-08-29 | 2018-02-13 | Box, Inc. | Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms |
US10038731B2 (en) | 2014-08-29 | 2018-07-31 | Box, Inc. | Managing flow-based interactions with cloud-based shared content |
US9917923B2 (en) * | 2014-09-26 | 2018-03-13 | Oracle International Corporation | Building message relationships for offline operation of an enterprise application |
US9715402B2 (en) * | 2014-09-30 | 2017-07-25 | Amazon Technologies, Inc. | Dynamic code deployment and versioning |
US10048974B1 (en) | 2014-09-30 | 2018-08-14 | Amazon Technologies, Inc. | Message-based computation request scheduling |
US9600312B2 (en) | 2014-09-30 | 2017-03-21 | Amazon Technologies, Inc. | Threading as a service |
US9830193B1 (en) | 2014-09-30 | 2017-11-28 | Amazon Technologies, Inc. | Automatic management of low latency computational capacity |
US9323556B2 (en) | 2014-09-30 | 2016-04-26 | Amazon Technologies, Inc. | Programmatic event detection and message generation for requests to execute program code |
US9146764B1 (en) | 2014-09-30 | 2015-09-29 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
US9678773B1 (en) | 2014-09-30 | 2017-06-13 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
US9853863B1 (en) * | 2014-10-08 | 2017-12-26 | Servicenow, Inc. | Collision detection using state management of configuration items |
US9690834B2 (en) * | 2014-11-27 | 2017-06-27 | Siemens Product Lifecycle Management Software Inc. | Representation, comparison, and troubleshooting of native data between environments |
US9413626B2 (en) | 2014-12-05 | 2016-08-09 | Amazon Technologies, Inc. | Automatic management of resource sizing |
WO2016109578A1 (en) * | 2014-12-30 | 2016-07-07 | Sling Media, Inc. | Automated application installation on media players and other controlled devices |
US10769826B2 (en) | 2014-12-31 | 2020-09-08 | Servicenow, Inc. | Visual task board visualization |
US9727725B2 (en) | 2015-02-04 | 2017-08-08 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
US9733967B2 (en) | 2015-02-04 | 2017-08-15 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
US9588790B1 (en) | 2015-02-04 | 2017-03-07 | Amazon Technologies, Inc. | Stateful virtual compute system |
US20160246582A1 (en) * | 2015-02-25 | 2016-08-25 | Red Hat, Inc. | Generic Semantic Configuration Service |
US9846528B2 (en) | 2015-03-02 | 2017-12-19 | Dropbox, Inc. | Native application collaboration |
WO2016141131A1 (en) | 2015-03-03 | 2016-09-09 | Software Robotics Corporation Limited | Software robots for programmatically controlling computer programs to perform tasks |
CN107615277A (en) | 2015-03-26 | 2018-01-19 | 卡斯维尔公司 | System and method for inquiring about data source |
US9930103B2 (en) | 2015-04-08 | 2018-03-27 | Amazon Technologies, Inc. | Endpoint management system providing an application programming interface proxy service |
US9785476B2 (en) | 2015-04-08 | 2017-10-10 | Amazon Technologies, Inc. | Endpoint management system and virtual compute system |
KR102450899B1 (en) * | 2015-04-09 | 2022-10-04 | 오므론 가부시키가이샤 | Web-enabled interface for embedded server |
US10431106B1 (en) | 2015-04-13 | 2019-10-01 | Aptima, Inc. | Systems and methods to measure performance |
US10356157B2 (en) * | 2015-04-16 | 2019-07-16 | Google Llc | Systems and methods for notifying users of changes to files in cloud-based file-storage systems |
CN106155812A (en) | 2015-04-28 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Method, device, system and the electronic equipment of a kind of resource management to fictitious host computer |
KR101647278B1 (en) | 2015-04-29 | 2016-08-23 | (주)유미테크 | JSON Transformation of DNS Packet and Top Extraction Method |
US20180054471A1 (en) * | 2015-05-15 | 2018-02-22 | Hewlett-Packard Development Company, L.P. | Hardware Bus Redirection |
KR102328193B1 (en) * | 2015-06-24 | 2021-11-18 | 한국전자통신연구원 | Apparatus and method for virtual desktop service |
US11102313B2 (en) * | 2015-08-10 | 2021-08-24 | Oracle International Corporation | Transactional autosave with local and remote lifecycles |
US10582001B2 (en) | 2015-08-11 | 2020-03-03 | Oracle International Corporation | Asynchronous pre-caching of synchronously loaded resources |
US10419514B2 (en) | 2015-08-14 | 2019-09-17 | Oracle International Corporation | Discovery of federated logins |
US10452497B2 (en) | 2015-08-14 | 2019-10-22 | Oracle International Corporation | Restoration of UI state in transactional systems |
WO2017052624A1 (en) * | 2015-09-25 | 2017-03-30 | Intel Corporation | Iot service modeling with layered abstraction for reusability of applications and resources |
US9928108B1 (en) | 2015-09-29 | 2018-03-27 | Amazon Technologies, Inc. | Metaevent handling for on-demand code execution environments |
US10042660B2 (en) | 2015-09-30 | 2018-08-07 | Amazon Technologies, Inc. | Management of periodic requests for compute capacity |
US10582012B2 (en) | 2015-10-16 | 2020-03-03 | Oracle International Corporation | Adaptive data transfer optimization |
US20170154066A1 (en) * | 2015-11-30 | 2017-06-01 | International Business Machines Corporation | Subscription service for monitoring changes in remote content |
CN105404474A (en) * | 2015-12-07 | 2016-03-16 | 上海爱数信息技术股份有限公司 | Data migration method of heterogeneous distributed memory system |
US9811363B1 (en) | 2015-12-16 | 2017-11-07 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
US10013267B1 (en) | 2015-12-16 | 2018-07-03 | Amazon Technologies, Inc. | Pre-triggers for code execution environments |
US9811434B1 (en) | 2015-12-16 | 2017-11-07 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
US10754701B1 (en) | 2015-12-16 | 2020-08-25 | Amazon Technologies, Inc. | Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions |
US9830175B1 (en) | 2015-12-16 | 2017-11-28 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
US9830449B1 (en) | 2015-12-16 | 2017-11-28 | Amazon Technologies, Inc. | Execution locations for request-driven code |
US10002026B1 (en) | 2015-12-21 | 2018-06-19 | Amazon Technologies, Inc. | Acquisition and maintenance of dedicated, reserved, and variable compute capacity |
US10067801B1 (en) | 2015-12-21 | 2018-09-04 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
US9910713B2 (en) | 2015-12-21 | 2018-03-06 | Amazon Technologies, Inc. | Code execution request routing |
US9516620B1 (en) * | 2015-12-28 | 2016-12-06 | Motorola Solutions, Inc. | Method and apparatus for binding of a user-based public identity to a shared device in an internet protocol multimedia subsystem (IMS)-based communication system |
US10248933B2 (en) | 2015-12-29 | 2019-04-02 | Dropbox, Inc. | Content item activity feed for presenting events associated with content items |
CN106936871B (en) * | 2015-12-30 | 2020-05-29 | 阿里巴巴集团控股有限公司 | Method and device for displaying data on interface |
US10620811B2 (en) | 2015-12-30 | 2020-04-14 | Dropbox, Inc. | Native application collaboration |
CN107015851A (en) * | 2016-01-28 | 2017-08-04 | 阿里巴巴集团控股有限公司 | A kind of serviced component management method and system |
CN105591842B (en) * | 2016-01-29 | 2018-12-21 | 中国联合网络通信集团有限公司 | A kind of method and apparatus obtaining mobile terminal operating system version |
US10044098B2 (en) * | 2016-02-19 | 2018-08-07 | Facebook, Inc. | Modular base station |
US11194572B2 (en) | 2016-02-22 | 2021-12-07 | International Business Machines Corporation | Managing external feeds in an event-based computing system |
US10728727B2 (en) * | 2016-03-04 | 2020-07-28 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Systems and methods for reducing interference in wireless communication among computing devices |
WO2017156496A1 (en) * | 2016-03-11 | 2017-09-14 | Post Oak Today LLC | Methods and apparatus for establishing shared memory spaces for data access and distribution |
US10437521B2 (en) * | 2016-03-25 | 2019-10-08 | Netapp, Inc. | Consistent method of indexing file system information |
US11132213B1 (en) | 2016-03-30 | 2021-09-28 | Amazon Technologies, Inc. | Dependency-based process of pre-existing data sets at an on demand code execution environment |
US10162672B2 (en) | 2016-03-30 | 2018-12-25 | Amazon Technologies, Inc. | Generating data streams from pre-existing data sets |
US10891145B2 (en) | 2016-03-30 | 2021-01-12 | Amazon Technologies, Inc. | Processing pre-existing data sets at an on demand code execution environment |
US10382502B2 (en) | 2016-04-04 | 2019-08-13 | Dropbox, Inc. | Change comments for synchronized content items |
CN107515879B (en) * | 2016-06-16 | 2021-03-19 | 伊姆西Ip控股有限责任公司 | Method and electronic equipment for document retrieval |
US9952896B2 (en) | 2016-06-28 | 2018-04-24 | Amazon Technologies, Inc. | Asynchronous task management in an on-demand network code execution environment |
US10282229B2 (en) | 2016-06-28 | 2019-05-07 | Amazon Technologies, Inc. | Asynchronous task management in an on-demand network code execution environment |
US10102040B2 (en) | 2016-06-29 | 2018-10-16 | Amazon Technologies, Inc | Adjusting variable limit on concurrent code executions |
US10203990B2 (en) | 2016-06-30 | 2019-02-12 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
US10277708B2 (en) | 2016-06-30 | 2019-04-30 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
US11314546B2 (en) * | 2016-11-18 | 2022-04-26 | Data Accelerator Ltd | Method and system for executing a containerized stateful application on a stateless computing platform using machine learning |
CN107622006B (en) * | 2016-07-14 | 2020-07-07 | 上海思立微电子科技有限公司 | Mobile device testing system and method for testing mobile device |
US10061613B1 (en) | 2016-09-23 | 2018-08-28 | Amazon Technologies, Inc. | Idempotent task execution in on-demand network code execution systems |
US10884787B1 (en) | 2016-09-23 | 2021-01-05 | Amazon Technologies, Inc. | Execution guarantees in an on-demand network code execution system |
US11348072B2 (en) * | 2016-09-26 | 2022-05-31 | Microsoft Technology Licensing, Llc | Techniques for sharing electronic calendars between mailboxes in an online application and collaboration service |
US10185550B2 (en) | 2016-09-28 | 2019-01-22 | Mcafee, Inc. | Device-driven auto-recovery using multiple recovery sources |
US11119813B1 (en) | 2016-09-30 | 2021-09-14 | Amazon Technologies, Inc. | Mapreduce implementation using an on-demand network code execution system |
WO2018078457A1 (en) * | 2016-10-28 | 2018-05-03 | Calgary Scientific Inc. | Multi-window architecture and data communication for a remote access application session |
CN108075922A (en) * | 2016-11-14 | 2018-05-25 | 普天信息技术有限公司 | A kind of telecommunication network management system |
KR20180060191A (en) * | 2016-11-28 | 2018-06-07 | 주식회사 마인케이 | Method for sharing objectless model defined declaratively without platform constraints and apparatus thereof |
EP3934203A1 (en) | 2016-12-30 | 2022-01-05 | INTEL Corporation | Decentralized data storage and processing for iot devices |
US10785288B2 (en) * | 2017-02-22 | 2020-09-22 | International Business Machines Corporation | Deferential support of request driven cloud services |
US10922661B2 (en) | 2017-03-27 | 2021-02-16 | Microsoft Technology Licensing, Llc | Controlling a computing system to generate a pre-accept cache for calendar sharing |
US11010361B1 (en) * | 2017-03-30 | 2021-05-18 | Amazon Technologies, Inc. | Executing code associated with objects in a hierarchial data structure |
US10306433B1 (en) * | 2017-05-01 | 2019-05-28 | Sprint Communications Company L.P. | Mobile phone differentiated user set-up |
US10817492B2 (en) * | 2017-05-05 | 2020-10-27 | Servicenow, Inc. | Application extension |
CN107391128B (en) * | 2017-07-07 | 2020-07-28 | 北京小米移动软件有限公司 | Method and device for monitoring virtual file object model vdom |
US20240275400A1 (en) * | 2017-10-30 | 2024-08-15 | AtomBeam Technologies Inc. | Event-driven data transmission using codebooks with protocol adaption |
JP6954023B2 (en) * | 2017-11-13 | 2021-10-27 | トヨタ自動車株式会社 | Sharing system, sharing method and management server |
US10564946B1 (en) | 2017-12-13 | 2020-02-18 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10303492B1 (en) | 2017-12-13 | 2019-05-28 | Amazon Technologies, Inc. | Managing custom runtimes in an on-demand code execution system |
US10353678B1 (en) | 2018-02-05 | 2019-07-16 | Amazon Technologies, Inc. | Detecting code characteristic alterations due to cross-service calls |
US10572375B1 (en) | 2018-02-05 | 2020-02-25 | Amazon Technologies, Inc. | Detecting parameter validity in code including cross-service calls |
US10831898B1 (en) | 2018-02-05 | 2020-11-10 | Amazon Technologies, Inc. | Detecting privilege escalations in code including cross-service calls |
US10733085B1 (en) | 2018-02-05 | 2020-08-04 | Amazon Technologies, Inc. | Detecting impedance mismatches due to cross-service calls |
US10725752B1 (en) | 2018-02-13 | 2020-07-28 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10776091B1 (en) | 2018-02-26 | 2020-09-15 | Amazon Technologies, Inc. | Logging endpoint in an on-demand code execution system |
WO2019168715A1 (en) * | 2018-03-01 | 2019-09-06 | Huawei Technologies Co. Ltd. | Event to serverless function workflow instance mapping mechanism |
CN109739717B (en) * | 2018-04-12 | 2021-01-26 | 京东方科技集团股份有限公司 | Page data acquisition method and device and server |
US10853115B2 (en) | 2018-06-25 | 2020-12-01 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
US10649749B1 (en) | 2018-06-26 | 2020-05-12 | Amazon Technologies, Inc. | Cross-environment application of tracing information for improved code execution |
US11146569B1 (en) | 2018-06-28 | 2021-10-12 | Amazon Technologies, Inc. | Escalation-resistant secure network services using request-scoped authentication information |
US10949237B2 (en) | 2018-06-29 | 2021-03-16 | Amazon Technologies, Inc. | Operating system customization in an on-demand network code execution system |
US10817351B1 (en) | 2018-07-13 | 2020-10-27 | Blend Labs, Inc. | Method and apparatus for hybrid service event |
US11099870B1 (en) | 2018-07-25 | 2021-08-24 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
CN109194639B (en) * | 2018-08-24 | 2021-10-08 | 北京小米移动软件有限公司 | Message receiving and processing method, device, terminal and readable storage medium |
US11099917B2 (en) | 2018-09-27 | 2021-08-24 | Amazon Technologies, Inc. | Efficient state maintenance for execution environments in an on-demand code execution system |
US11243953B2 (en) | 2018-09-27 | 2022-02-08 | Amazon Technologies, Inc. | Mapreduce implementation in an on-demand network code execution system and stream data processing system |
US10803087B2 (en) * | 2018-10-19 | 2020-10-13 | Oracle International Corporation | Language interoperable runtime adaptable data collections |
US11943093B1 (en) | 2018-11-20 | 2024-03-26 | Amazon Technologies, Inc. | Network connection recovery after virtual machine transition in an on-demand network code execution system |
US10884812B2 (en) | 2018-12-13 | 2021-01-05 | Amazon Technologies, Inc. | Performance-based hardware emulation in an on-demand network code execution system |
US11010188B1 (en) | 2019-02-05 | 2021-05-18 | Amazon Technologies, Inc. | Simulated data object storage using on-demand computation of data objects |
US11861386B1 (en) | 2019-03-22 | 2024-01-02 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
US10942723B2 (en) | 2019-04-05 | 2021-03-09 | Sap Se | Format for multi-artefact software packages |
US10809994B1 (en) * | 2019-04-05 | 2020-10-20 | Sap Se | Declarative multi-artefact software installation |
US11232078B2 (en) | 2019-04-05 | 2022-01-25 | Sap Se | Multitenancy using an overlay file system |
US11113249B2 (en) | 2019-04-05 | 2021-09-07 | Sap Se | Multitenant application server using a union file system |
US10956140B2 (en) | 2019-04-05 | 2021-03-23 | Sap Se | Software installation through an overlay file system |
US11119809B1 (en) | 2019-06-20 | 2021-09-14 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
EP3970016A4 (en) * | 2019-06-21 | 2022-05-18 | Snapt, Inc | Control configuration for a plurality of endpoint devices |
US11115404B2 (en) | 2019-06-28 | 2021-09-07 | Amazon Technologies, Inc. | Facilitating service connections in serverless code executions |
US11159528B2 (en) | 2019-06-28 | 2021-10-26 | Amazon Technologies, Inc. | Authentication to network-services using hosted authentication information |
US11190609B2 (en) | 2019-06-28 | 2021-11-30 | Amazon Technologies, Inc. | Connection pooling for scalable network services |
CN112230909B (en) * | 2019-07-15 | 2023-05-23 | 腾讯科技(深圳)有限公司 | Method, device, equipment and storage medium for binding data of applet |
US11023416B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | Data access control system for object storage service based on owner-defined code |
US11023311B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | On-demand code execution in input path of data uploaded to storage service in multiple data portions |
US10908927B1 (en) | 2019-09-27 | 2021-02-02 | Amazon Technologies, Inc. | On-demand execution of object filter code in output path of object storage service |
US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
US11106477B2 (en) | 2019-09-27 | 2021-08-31 | Amazon Technologies, Inc. | Execution of owner-specified code during input/output path to object storage service |
US11055112B2 (en) | 2019-09-27 | 2021-07-06 | Amazon Technologies, Inc. | Inserting executions of owner-specified code into input/output path of object storage service |
US11250007B1 (en) | 2019-09-27 | 2022-02-15 | Amazon Technologies, Inc. | On-demand execution of object combination code in output path of object storage service |
US10996961B2 (en) | 2019-09-27 | 2021-05-04 | Amazon Technologies, Inc. | On-demand indexing of data in input path of object storage service |
US11394761B1 (en) | 2019-09-27 | 2022-07-19 | Amazon Technologies, Inc. | Execution of user-submitted code on a stream of data |
US11386230B2 (en) | 2019-09-27 | 2022-07-12 | Amazon Technologies, Inc. | On-demand code obfuscation of data in input path of object storage service |
US11119826B2 (en) | 2019-11-27 | 2021-09-14 | Amazon Technologies, Inc. | Serverless call distribution to implement spillover while avoiding cold starts |
US10942795B1 (en) | 2019-11-27 | 2021-03-09 | Amazon Technologies, Inc. | Serverless call distribution to utilize reserved capacity without inhibiting scaling |
US11822522B2 (en) * | 2020-01-31 | 2023-11-21 | EMC IP Holding Company LLC | Intelligent filesystem for container images |
US11714682B1 (en) | 2020-03-03 | 2023-08-01 | Amazon Technologies, Inc. | Reclaiming computing resources in an on-demand code execution system |
US11188391B1 (en) | 2020-03-11 | 2021-11-30 | Amazon Technologies, Inc. | Allocating resources to on-demand code executions under scarcity conditions |
US11775640B1 (en) | 2020-03-30 | 2023-10-03 | Amazon Technologies, Inc. | Resource utilization-based malicious task detection in an on-demand code execution system |
US11418588B2 (en) | 2020-09-29 | 2022-08-16 | EMC IP Holding Company LLC | Intelligent peer-to-peer container filesystem |
US11593270B1 (en) | 2020-11-25 | 2023-02-28 | Amazon Technologies, Inc. | Fast distributed caching using erasure coded object parts |
US11550713B1 (en) | 2020-11-25 | 2023-01-10 | Amazon Technologies, Inc. | Garbage collection in distributed systems using life cycled storage roots |
US11416454B2 (en) | 2021-01-14 | 2022-08-16 | Bank Of America Corporation | Correction, synchronization, and migration of databases |
US11379440B1 (en) * | 2021-01-14 | 2022-07-05 | Bank Of America Corporation | Correction, synchronization, and migration of databases |
US11228627B1 (en) * | 2021-03-19 | 2022-01-18 | Microsoft Technology Licensing, Llc | Updating user-specific application instances based on collaborative object activity |
US11388210B1 (en) | 2021-06-30 | 2022-07-12 | Amazon Technologies, Inc. | Streaming analytics using a serverless compute system |
US12067529B2 (en) * | 2021-07-14 | 2024-08-20 | Sap Se | Bundling line item based events in an event-driven architecture |
US11968280B1 (en) | 2021-11-24 | 2024-04-23 | Amazon Technologies, Inc. | Controlling ingestion of streaming data to serverless function executions |
US12015603B2 (en) | 2021-12-10 | 2024-06-18 | Amazon Technologies, Inc. | Multi-tenant mode for serverless code execution |
US11888708B1 (en) | 2023-02-02 | 2024-01-30 | Bank Of America Corporation | System and method for auto-determining solutions for dynamic issues in a distributed network |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6223345B1 (en) * | 1999-08-30 | 2001-04-24 | J.D. Edwards World Source Company | System and method for building client and server application packages |
WO2002097616A1 (en) * | 2001-05-22 | 2002-12-05 | Nanyang University | Collaborative virtual enivonment system and method |
US20050091655A1 (en) * | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Associating runtime objects with a set and controlling access to resources as a function thereof |
US20050114871A1 (en) * | 2003-11-24 | 2005-05-26 | Wolff Adam G. | System for optimizing application start-up |
US20050289531A1 (en) * | 2004-06-08 | 2005-12-29 | Daniel Illowsky | Device interoperability tool set and method for processing interoperability application specifications into interoperable application packages |
US20060150188A1 (en) * | 2004-12-21 | 2006-07-06 | Manuel Roman | Method and apparatus for supporting soft real-time behavior |
US20080128715A1 (en) * | 2006-11-30 | 2008-06-05 | Clark Williams | Optimization utility for developing embedded systems |
US20080201701A1 (en) * | 2006-10-03 | 2008-08-21 | Salesforce.Com, Inc. | Methods and systems for upgrading and installing application packages to an application platform |
Family Cites Families (308)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5220657A (en) | 1987-12-02 | 1993-06-15 | Xerox Corporation | Updating local copy of shared data in a collaborative system |
JPH0619771A (en) * | 1992-04-20 | 1994-01-28 | Internatl Business Mach Corp <Ibm> | File management system of shared file by different kinds of clients |
US5392400A (en) | 1992-07-02 | 1995-02-21 | International Business Machines Corporation | Collaborative computing system using pseudo server process to allow input from different server processes individually and sequence number map for maintaining received data sequence |
US5553242A (en) * | 1993-11-03 | 1996-09-03 | Wang Laboratories, Inc. | Client/server connection sharing |
US5778222A (en) * | 1994-06-27 | 1998-07-07 | International Business Machines Corporation | Method and system for managing access to objects |
US6604103B1 (en) * | 1994-09-02 | 2003-08-05 | Mark A. Wolfe | System and method for information retrieval employing a preloading procedure |
US5956715A (en) * | 1994-12-13 | 1999-09-21 | Microsoft Corporation | Method and system for controlling user access to a resource in a networked computing environment |
US5608903A (en) * | 1994-12-15 | 1997-03-04 | Novell, Inc. | Method and apparatus for moving subtrees in a distributed network directory |
US6901433B2 (en) * | 1995-06-07 | 2005-05-31 | Microsoft Corporation | System for providing users with a filtered view of interactive network directory obtains from remote properties cache that provided by an on-line service |
WO1997004389A1 (en) | 1995-07-20 | 1997-02-06 | Novell, Inc. | Transaction synchronization in a disconnectable computer and network |
AU6500596A (en) * | 1995-07-20 | 1997-02-18 | Novell, Inc. | Transaction log management in a disconnectable computer and network |
US5701458A (en) * | 1995-09-20 | 1997-12-23 | International Business Machines Corporation | System and method for managing arbitrary subsets of access control lists in a computer network |
US5661771A (en) * | 1995-12-04 | 1997-08-26 | General Electric Company | Inner filter for a control rod drive |
GB2308468A (en) * | 1995-12-20 | 1997-06-25 | Ibm | Data processing systems and methods providing interoperability between data processing resources |
US5832512A (en) | 1996-04-15 | 1998-11-03 | Sun Microsystems, Inc. | Apparatus and method for file number re-mapping for disconnected operations in a client-server network |
US6199116B1 (en) * | 1996-05-24 | 2001-03-06 | Microsoft Corporation | Method and system for managing data while sharing application programs |
US5878225A (en) * | 1996-06-03 | 1999-03-02 | International Business Machines Corporation | Dual communication services interface for distributed transaction processing |
US5878434A (en) * | 1996-07-18 | 1999-03-02 | Novell, Inc | Transaction clash management in a disconnectable computer and network |
US7680879B2 (en) * | 1996-07-18 | 2010-03-16 | Computer Associates Think, Inc. | Method and apparatus for maintaining data integrity across distributed computer systems |
US20020059402A1 (en) | 1996-11-15 | 2002-05-16 | Charles E. Belanger | Server-sided internet-based platform independent operating system and application suite |
US6028602A (en) * | 1997-05-30 | 2000-02-22 | Telefonaktiebolaget Lm Ericsson | Method for managing contents of a hierarchical data model |
US5966512A (en) | 1997-06-05 | 1999-10-12 | International Business Machines Corporation | Groupware save operation |
US7240094B2 (en) | 1997-07-03 | 2007-07-03 | Centra Software Inc. | Method and system for synchronizing and serving multimedia in a distributed network |
US6233600B1 (en) | 1997-07-15 | 2001-05-15 | Eroom Technology, Inc. | Method and system for providing a networked collaborative work environment |
US6256712B1 (en) * | 1997-08-01 | 2001-07-03 | International Business Machines Corporation | Scaleable method for maintaining and making consistent updates to caches |
US6275953B1 (en) | 1997-09-26 | 2001-08-14 | Emc Corporation | Recovery from failure of a data processor in a network server |
US6621505B1 (en) * | 1997-09-30 | 2003-09-16 | Journee Software Corp. | Dynamic process-based enterprise computing system and method |
US5926177A (en) | 1997-10-17 | 1999-07-20 | International Business Machines Corporation | Providing multiple views in a model-view-controller architecture |
US6219693B1 (en) * | 1997-11-04 | 2001-04-17 | Adaptec, Inc. | File array storage architecture having file system distributed across a data processing platform |
US5987471A (en) * | 1997-11-13 | 1999-11-16 | Novell, Inc. | Sub-foldering system in a directory-service-based launcher |
US6362836B1 (en) | 1998-04-06 | 2002-03-26 | The Santa Cruz Operation, Inc. | Universal application server for providing applications on a variety of client devices in a client/server network |
US6104392A (en) * | 1997-11-13 | 2000-08-15 | The Santa Cruz Operation, Inc. | Method of displaying an application on a variety of client devices in a client/server network |
US6981061B1 (en) | 1997-11-14 | 2005-12-27 | Mitsubishi Denki Kabushiki Kaisha | Method and system for updating a data system in conjunction with synchronized clock modules |
US6553368B2 (en) * | 1998-03-03 | 2003-04-22 | Sun Microsystems, Inc. | Network directory access mechanism |
US6226650B1 (en) | 1998-09-17 | 2001-05-01 | Synchrologic, Inc. | Database synchronization and organization system and method |
US6341291B1 (en) * | 1998-09-28 | 2002-01-22 | Bentley Systems, Inc. | System for collaborative engineering using component and file-oriented tools |
US6335741B1 (en) * | 1999-01-06 | 2002-01-01 | International Business Machines Corporation | Apparatus and method for user indication of model state in a model view controller |
US6922708B1 (en) * | 1999-02-18 | 2005-07-26 | Oracle International Corporation | File system that supports transactions |
US6826597B1 (en) | 1999-03-17 | 2004-11-30 | Oracle International Corporation | Providing clients with services that retrieve data from data sources that do not necessarily support the format required by the clients |
US6341314B1 (en) | 1999-03-30 | 2002-01-22 | International Business Machines Corporation | Web-based virtual computing machine |
US6651096B1 (en) | 1999-04-20 | 2003-11-18 | Cisco Technology, Inc. | Method and apparatus for organizing, storing and evaluating access control lists |
US6681370B2 (en) * | 1999-05-19 | 2004-01-20 | Microsoft Corporation | HTML/XML tree synchronization |
US7472349B1 (en) * | 1999-06-01 | 2008-12-30 | Oracle International Corporation | Dynamic services infrastructure for allowing programmatic access to internet and other resources |
US7181438B1 (en) | 1999-07-21 | 2007-02-20 | Alberti Anemometer, Llc | Database access system |
US6523027B1 (en) * | 1999-07-30 | 2003-02-18 | Accenture Llp | Interfacing servers in a Java based e-commerce architecture |
US6633878B1 (en) * | 1999-07-30 | 2003-10-14 | Accenture Llp | Initializing an ecommerce database framework |
US6549916B1 (en) * | 1999-08-05 | 2003-04-15 | Oracle Corporation | Event notification system tied to a file system |
US6526413B2 (en) * | 1999-09-28 | 2003-02-25 | Microsoft Corporation | Architecture for a hierarchical folder structure in hand-held computers |
US6388853B1 (en) | 1999-09-28 | 2002-05-14 | Power Integrations, Inc. | Method and apparatus providing final test and trimming for a power supply controller |
JP4237354B2 (en) * | 1999-09-29 | 2009-03-11 | 株式会社東芝 | Transaction processing method and transaction processing system |
US6968539B1 (en) * | 1999-09-30 | 2005-11-22 | International Business Machines Corporation | Methods and apparatus for a web application processing system |
US6389420B1 (en) | 1999-09-30 | 2002-05-14 | Emc Corporation | File manager providing distributed locking and metadata management for shared data access by clients relinquishing locks after time period expiration |
US7685252B1 (en) | 1999-10-12 | 2010-03-23 | International Business Machines Corporation | Methods and systems for multi-modal browsing and implementation of a conversational markup language |
US7680819B1 (en) | 1999-11-12 | 2010-03-16 | Novell, Inc. | Managing digital identity information |
JP3594231B2 (en) * | 1999-11-30 | 2004-11-24 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Information control system, information processing support server, information processing terminal, information processing method, and storage medium |
US6721727B2 (en) * | 1999-12-02 | 2004-04-13 | International Business Machines Corporation | XML documents stored as column data |
US7124356B1 (en) | 1999-12-03 | 2006-10-17 | Koninklijke Philips Electronics N.V. | Methods for initiating activity in intelligent devices connected to an in home digital network using extensible markup language (XML) for information exchange and systems therefor |
US6603476B1 (en) * | 1999-12-17 | 2003-08-05 | International Business Machines Corporation | Method, system and program for topographically aware operating system |
US6772413B2 (en) * | 1999-12-21 | 2004-08-03 | Datapower Technology, Inc. | Method and apparatus of data exchange using runtime code generator and translator |
US7590644B2 (en) * | 1999-12-21 | 2009-09-15 | International Business Machine Corporation | Method and apparatus of streaming data transformation using code generator and translator |
US8255809B2 (en) * | 1999-12-23 | 2012-08-28 | International Business Machines Corporation | Webtop: multiple applet delivery within a fixed-sized viewing space |
KR100341395B1 (en) | 1999-12-27 | 2002-06-22 | 오길록 | Collaborative group editor system using JAVA specific property on internet and method thereof |
US6901403B1 (en) | 2000-03-02 | 2005-05-31 | Quovadx, Inc. | XML presentation of general-purpose data sources |
WO2001069384A2 (en) | 2000-03-14 | 2001-09-20 | Buzzpad, Inc. | Method and apparatus for forming linked multi-user groups of shared software applications |
US7418439B2 (en) | 2000-03-17 | 2008-08-26 | Twin Peaks Software, Inc. | Mirror file system |
US6856993B1 (en) * | 2000-03-30 | 2005-02-15 | Microsoft Corporation | Transactional file system |
US20010039548A1 (en) * | 2000-04-27 | 2001-11-08 | Yoshitake Shinkai | File replication system, replication control method, and storage medium |
US7987217B2 (en) | 2000-05-12 | 2011-07-26 | Oracle International Corporation | Transaction-aware caching for document metadata |
US6922685B2 (en) | 2000-05-22 | 2005-07-26 | Mci, Inc. | Method and system for managing partitioned data resources |
DE10026478A1 (en) | 2000-05-27 | 2001-12-20 | Abb Patent Gmbh | Generating method for application specific input files, involves preparing application specific files by canon-like transformation from generated object descriptions in XML representation |
US6941510B1 (en) | 2000-06-06 | 2005-09-06 | Groove Networks, Inc. | Method and apparatus for efficient management of XML documents |
US20020156702A1 (en) * | 2000-06-23 | 2002-10-24 | Benjamin Kane | System and method for producing, publishing, managing and interacting with e-content on multiple platforms |
US6711593B1 (en) * | 2000-06-26 | 2004-03-23 | Camstar Systems, Inc. | System and method for live update of a manufacturing system |
US20030037181A1 (en) | 2000-07-07 | 2003-02-20 | Freed Erik J. | Method and apparatus for providing process-container platforms |
US6952716B1 (en) * | 2000-07-12 | 2005-10-04 | Treehouse Solutions, Inc. | Method and system for presenting data over a network based on network user choices and collecting real-time data related to said choices |
CN1195278C (en) | 2000-08-02 | 2005-03-30 | 菲利普·库特 | XML-robot |
AU2001287421A1 (en) | 2000-08-21 | 2002-03-04 | Thoughtslinger Corporation | Simultaneous multi-user document editing system |
TW512526B (en) * | 2000-09-07 | 2002-12-01 | Sanyo Electric Co | Semiconductor integrated circuit device and manufacturing method thereof |
US7873649B2 (en) * | 2000-09-07 | 2011-01-18 | Oracle International Corporation | Method and mechanism for identifying transaction on a row of data |
US7958185B2 (en) | 2000-09-18 | 2011-06-07 | Bentley Systems, Inc. | Spatial data enabled engineering, construction, and operations computer-aided design (CAD) project system, method and computer program product |
US6571259B1 (en) | 2000-09-26 | 2003-05-27 | Emc Corporation | Preallocation of file system cache blocks in a data storage system |
US6862595B1 (en) | 2000-10-02 | 2005-03-01 | International Business Machines Corporation | Method and apparatus for implementing a shared message queue using a list structure |
US6996800B2 (en) | 2000-12-04 | 2006-02-07 | International Business Machines Corporation | MVC (model-view-controller) based multi-modal authoring tool and development environment |
US6925631B2 (en) * | 2000-12-08 | 2005-08-02 | Hewlett-Packard Development Company, L.P. | Method, computer system and computer program product for processing extensible markup language streams |
US7130883B2 (en) * | 2000-12-29 | 2006-10-31 | Webex Communications, Inc. | Distributed network system architecture for collaborative computing |
US20030189593A1 (en) | 2001-01-05 | 2003-10-09 | Yarvin Curtis G. | Method and apparatus for dynamically updating a markup language based user interface |
US7634726B2 (en) * | 2001-01-05 | 2009-12-15 | International Business Machines Corporation | Technique for automated e-business services |
US7546298B2 (en) * | 2001-01-09 | 2009-06-09 | Nextair Corporation | Software, devices and methods facilitating execution of server-side applications at mobile devices |
US7640320B2 (en) | 2001-01-18 | 2009-12-29 | Yahoo! Inc. | Method and system for managing digital content, including streaming media |
US7275070B2 (en) | 2001-01-23 | 2007-09-25 | Conformia Software, Inc. | System and method for managing the development and manufacturing of a pharmaceutical drug |
US6732109B2 (en) | 2001-01-31 | 2004-05-04 | The Eon Company | Method and system for transferring information between a user interface and a database over a global information network |
WO2002065278A2 (en) | 2001-02-12 | 2002-08-22 | Lto Limited | A presentation server which enables a client device to run a network based application |
US6804677B2 (en) * | 2001-02-26 | 2004-10-12 | Ori Software Development Ltd. | Encoding semi-structured data for efficient search and browsing |
US7031989B2 (en) | 2001-02-26 | 2006-04-18 | International Business Machines Corporation | Dynamic seamless reconfiguration of executing parallel software |
US20030041076A1 (en) * | 2001-03-14 | 2003-02-27 | Lucovsky Mark H. | Schema-based services for identity-based access to calendar data |
US7246104B2 (en) | 2001-03-21 | 2007-07-17 | Nokia Corporation | Method and apparatus for information delivery with archive containing metadata in predetermined language and semantics |
WO2002080457A1 (en) * | 2001-03-29 | 2002-10-10 | Sphere Software Corporation | Layering enterprise application services using semantic firewalls |
US20030088536A1 (en) | 2001-04-09 | 2003-05-08 | Afshin Behnia | Platform within an organization for providing knowledge management and decision support services |
US7499948B2 (en) | 2001-04-16 | 2009-03-03 | Bea Systems, Inc. | System and method for web-based personalization and ecommerce management |
US7359920B1 (en) * | 2001-04-18 | 2008-04-15 | Intellisync Corporation | Communication protocol for synchronization of personal information management databases |
US6968346B2 (en) | 2001-04-23 | 2005-11-22 | International Business Machines Corporation | XML-based system and method for collaborative web-based design and verification of system-on-a-chip |
US20030184583A1 (en) | 2001-06-28 | 2003-10-02 | Chaeuk Lim | Web os and web desktop |
US7203866B2 (en) * | 2001-07-05 | 2007-04-10 | At & T Corp. | Method and apparatus for a programming language having fully undoable, timed reactive instructions |
US6920461B2 (en) | 2001-07-10 | 2005-07-19 | Microsoft Corp. | Application program interface for network software platform |
US7176931B2 (en) * | 2001-08-13 | 2007-02-13 | International Business Machines Corporation | Modifying hyperlink display characteristics |
US7254610B1 (en) | 2001-09-19 | 2007-08-07 | Cisco Technology, Inc. | Delivery of services to a network enabled telephony device based on transfer of selected model view controller objects to reachable network nodes |
US7275096B2 (en) * | 2001-09-20 | 2007-09-25 | Telelogic North America Inc. | Computerized system and method for web enabling and/or web management of embedded applications |
US20030069881A1 (en) * | 2001-10-03 | 2003-04-10 | Nokia Corporation | Apparatus and method for dynamic partitioning of structured documents |
US6874001B2 (en) * | 2001-10-05 | 2005-03-29 | International Business Machines Corporation | Method of maintaining data consistency in a loose transaction model |
US20030084019A1 (en) * | 2001-10-30 | 2003-05-01 | General Electric Company | Process for lifetime tracking of serialized parts |
US6920469B2 (en) | 2001-11-13 | 2005-07-19 | Tadpole Technology Plc | Unique ID management in disconnected database replication |
WO2003046694A2 (en) | 2001-11-28 | 2003-06-05 | Bow Street Software, Inc. | Method and apparatus for creating software objects |
WO2003050674A1 (en) * | 2001-12-07 | 2003-06-19 | Dbase, Inc. | Drag-and-drop dynamic distributed object model |
JP4163870B2 (en) * | 2001-12-28 | 2008-10-08 | 富士通株式会社 | Structured document converter |
US20030131144A1 (en) | 2002-01-10 | 2003-07-10 | Ncr Corporation | Data wedge |
JP4490026B2 (en) | 2002-01-28 | 2010-06-23 | 日立オムロンターミナルソリューションズ株式会社 | Customizable information processing device |
IES20030062A2 (en) | 2002-02-04 | 2003-08-06 | Mobileaware Technologies Ltd | Document transformation |
WO2003067787A2 (en) | 2002-02-08 | 2003-08-14 | I/O Integrity, Inc. | Redirecting local disk traffic to network attached storage |
CA2371646A1 (en) | 2002-02-13 | 2003-08-13 | Ibm Canada Limited-Ibm Canada Limitee | Configuration model for configuring an adapter software component to selectively access software objects and object editor using instance of same |
US7962925B2 (en) | 2002-02-22 | 2011-06-14 | Oracle International Corporation | System and method for XML data binding |
US7386835B1 (en) | 2002-03-22 | 2008-06-10 | Emc Corporation | Technique for graphical user interface modification |
US7080102B2 (en) | 2002-03-25 | 2006-07-18 | Emc Corporation | Method and system for migrating data while maintaining hard links |
US6938042B2 (en) | 2002-04-03 | 2005-08-30 | Laplink Software Inc. | Peer-to-peer file sharing |
US7532340B2 (en) * | 2002-04-19 | 2009-05-12 | Toshiba Tec Kabushiki Kaisha | Document management system rule-based automation |
US7725590B2 (en) | 2002-04-19 | 2010-05-25 | Computer Associates Think, Inc. | Web services broker |
US8407326B2 (en) * | 2002-04-23 | 2013-03-26 | International Business Machines Corporation | Anchoring method for computing an XPath expression |
DE10218905B4 (en) | 2002-04-26 | 2016-03-17 | Intelligent Views Gmbh | Method and data structure for access control in knowledge networks |
US7424717B2 (en) * | 2002-05-01 | 2008-09-09 | Bea Systems, Inc. | Systems and methods for business process plug-in development |
US7627631B2 (en) * | 2002-05-02 | 2009-12-01 | Bea Systems, Inc. | Systems and methods for collaborative business plug-ins |
US7987491B2 (en) | 2002-05-10 | 2011-07-26 | Richard Reisman | Method and apparatus for browsing using alternative linkbases |
US20030217191A1 (en) * | 2002-05-20 | 2003-11-20 | Yang Gao | System and method for converting the UI logic of a windows software application to run within a web browser |
US7386797B1 (en) | 2002-05-22 | 2008-06-10 | Oracle Corporation | Framework to model and execute business processes within a collaborative environment |
US7490167B2 (en) * | 2002-05-22 | 2009-02-10 | Sony Corporation | System and method for platform and language-independent development and delivery of page-based content |
US7640300B2 (en) * | 2002-06-10 | 2009-12-29 | Microsoft Corporation | Presence and notification system for maintaining and communicating information |
JP4382328B2 (en) | 2002-06-11 | 2009-12-09 | 株式会社日立製作所 | Secure storage system |
US20060184617A1 (en) | 2005-02-11 | 2006-08-17 | Nicholas Frank C | Method and system for the creating, managing, and delivery of feed formatted content |
US7275087B2 (en) | 2002-06-19 | 2007-09-25 | Microsoft Corporation | System and method providing API interface between XML and SQL while interacting with a managed object environment |
US7162485B2 (en) | 2002-06-19 | 2007-01-09 | Georg Gottlob | Efficient processing of XPath queries |
US7458018B2 (en) * | 2002-06-27 | 2008-11-25 | Microsoft Corporation | System and method for obtaining and using namespace related information for opening XML documents |
EP1376370B1 (en) | 2002-06-28 | 2017-06-14 | Oracle America, Inc. | Mechanism for starvation avoidance while maintaining cache consistency in computer systems |
US7203706B2 (en) | 2002-08-01 | 2007-04-10 | Oracle International Corporation | Buffered message queue architecture for database management systems with memory optimizations and “zero copy” buffered message queue |
US7721202B2 (en) * | 2002-08-16 | 2010-05-18 | Open Invention Network, Llc | XML streaming transformer |
AU2003262702A1 (en) * | 2002-08-23 | 2004-03-11 | Jway Group, Inc. | Extensible user interface (xui) framework and development environment |
US8019849B1 (en) | 2002-09-13 | 2011-09-13 | Symantec Operating Corporation | Server-side storage area network management interface |
US7558847B2 (en) | 2002-09-13 | 2009-07-07 | Intelliden, Inc. | System and method for mapping between and controlling different device abstractions |
US20040090458A1 (en) | 2002-11-12 | 2004-05-13 | Yu John Chung Wah | Method and apparatus for previewing GUI design and providing screen-to-source association |
EP1567929A2 (en) * | 2002-11-15 | 2005-08-31 | Creo Inc. | Methods and systems for sharing data |
US7191186B1 (en) * | 2002-11-27 | 2007-03-13 | Microsoft Corporation | Method and computer-readable medium for importing and exporting hierarchically structured data |
US20040111396A1 (en) | 2002-12-06 | 2004-06-10 | Eldar Musayev | Querying against a hierarchical structure such as an extensible markup language document |
JP2004192053A (en) | 2002-12-06 | 2004-07-08 | Bells System Kk | Client terminal program for reporting update information, and update information report system to client terminal |
US8332464B2 (en) | 2002-12-13 | 2012-12-11 | Anxebusiness Corp. | System and method for remote network access |
US7644361B2 (en) | 2002-12-23 | 2010-01-05 | Canon Kabushiki Kaisha | Method of using recommendations to visually create new views of data across heterogeneous sources |
US7774831B2 (en) | 2002-12-24 | 2010-08-10 | International Business Machines Corporation | Methods and apparatus for processing markup language messages in a network |
US7131116B1 (en) | 2002-12-30 | 2006-10-31 | Oracle International Corporation | Transformation of electronic messages to an extensible data format |
EP1588230A4 (en) | 2003-01-10 | 2008-05-07 | Nexaweb Technologies Inc | System and method for network-based computing |
US7376733B2 (en) | 2003-02-03 | 2008-05-20 | Hewlett-Packard Development Company, L.P. | Method and apparatus and program for scheduling and executing events in real time over a network |
US20040158586A1 (en) | 2003-02-10 | 2004-08-12 | Mingtar Tsai | Method and system of using shared file for data collaboration |
US20040176968A1 (en) * | 2003-03-07 | 2004-09-09 | Microsoft Corporation | Systems and methods for dynamically configuring business processes |
US20040181748A1 (en) * | 2003-03-10 | 2004-09-16 | International Business Machines Corporation | Thin client framework deployment of spreadsheet applications in a web browser based environment |
JP2004280283A (en) | 2003-03-13 | 2004-10-07 | Hitachi Ltd | Distributed file system, distributed file system server, and access method to distributed file system |
US20040187140A1 (en) | 2003-03-21 | 2004-09-23 | Werner Aigner | Application framework |
US7519969B2 (en) * | 2003-05-17 | 2009-04-14 | Microsoft Corporation | System and method for controlling user interface properties with data |
US20040243921A1 (en) * | 2003-05-30 | 2004-12-02 | Carr Steven Paul | Methods and systems for synchronizing document elements |
US7278109B2 (en) | 2003-06-03 | 2007-10-02 | International Business Machines Corporation | System and method for dynamic uploading of user interface generation logic |
US7194733B2 (en) | 2003-06-11 | 2007-03-20 | Microsoft Corporation | Transformation of an asynchronous transactional messaging language into a web services compatible language |
US20040260576A1 (en) | 2003-06-20 | 2004-12-23 | Dongwen Wang | Guideline execution task ontology (GETO) |
US7383255B2 (en) | 2003-06-23 | 2008-06-03 | Microsoft Corporation | Common query runtime system and application programming interface |
US7970936B2 (en) * | 2003-06-26 | 2011-06-28 | International Business Machines Corporation | In a world wide web communications network simplifying the uniform resource locators (URLS) displayed in association with received web documents |
US7162473B2 (en) | 2003-06-26 | 2007-01-09 | Microsoft Corporation | Method and system for usage analyzer that determines user accessed sources, indexes data subsets, and associated metadata, processing implicit queries based on potential interest to users |
CA2434644A1 (en) | 2003-06-30 | 2004-12-30 | Archidata Inc. | System for the certification of plans and specifications produced by construction professionals and clients |
FI117068B (en) * | 2003-07-04 | 2006-05-31 | Medicel Oy | Information management system for biochemical information |
US7873668B2 (en) * | 2003-08-15 | 2011-01-18 | Laszlo Systems, Inc. | Application data binding |
US7668935B2 (en) | 2003-08-29 | 2010-02-23 | Kabushiki Kaisha Toshiba | Computer system and method for service load distributing |
AU2003273203A1 (en) | 2003-10-01 | 2005-04-14 | Vibrasoft Pte. Ltd. | A method of updating a data source from transformed data |
US20050091340A1 (en) | 2003-10-01 | 2005-04-28 | International Business Machines Corporation | Processing interactive content offline |
US7467190B2 (en) * | 2003-10-06 | 2008-12-16 | Hitachi, Ltd. | Method and apparatus for alert distribution and archive sharing |
US7904882B2 (en) | 2003-10-16 | 2011-03-08 | Salesforce.Com, Inc. | Managing virtual business instances within a computer network |
US7231397B2 (en) | 2003-10-24 | 2007-06-12 | Microsoft Corporation | Method and system for transacted file operations over a network |
US7567987B2 (en) | 2003-10-24 | 2009-07-28 | Microsoft Corporation | File sharing in P2P group shared spaces |
US7607136B2 (en) | 2003-10-28 | 2009-10-20 | Hewlett-Packard Development Company, L.P. | Method and apparatus for interfacing with a distributed computing service |
US20050114487A1 (en) * | 2003-11-12 | 2005-05-26 | Jin Peng | Notification framework and method of distributing notification |
JP4273934B2 (en) | 2003-11-13 | 2009-06-03 | 株式会社日立製作所 | File system |
TW200518146A (en) | 2003-11-26 | 2005-06-01 | Soltek Comp Inc | Auxiliary push-button of magnetic (optical) disk drive |
US7373451B2 (en) | 2003-12-08 | 2008-05-13 | The Board Of Trustees Of The Leland Stanford Junior University | Cache-based system management architecture with virtual appliances, network repositories, and virtual appliance transceivers |
US7454496B2 (en) * | 2003-12-10 | 2008-11-18 | International Business Machines Corporation | Method for monitoring data resources of a data processing network |
KR100521742B1 (en) | 2003-12-17 | 2005-10-17 | 한국전자통신연구원 | Xml database duplicating apparatus for copying xml document to remote server without loss of structure and attribute information of xml document and method therefor |
US7272782B2 (en) * | 2003-12-19 | 2007-09-18 | Backweb Technologies, Inc. | System and method for providing offline web application, page, and form access in a networked environment |
US7487136B2 (en) | 2004-01-06 | 2009-02-03 | Sharp Laboratories Of America | Intelligent discovery of shares |
US7614052B2 (en) | 2004-01-09 | 2009-11-03 | Nexaweb Technologies Inc. | System and method for developing and deploying computer applications over a network |
US7873663B2 (en) | 2004-01-13 | 2011-01-18 | International Business Machines Corporation | Methods and apparatus for converting a representation of XML and other markup language data to a data structure format |
US20050165881A1 (en) | 2004-01-23 | 2005-07-28 | Pipelinefx, L.L.C. | Event-driven queuing system and method |
US7383308B1 (en) * | 2004-02-11 | 2008-06-03 | Aol Llc, A Delaware Limited Liability Company | Buddy list-based sharing of electronic content |
US7577938B2 (en) | 2004-02-20 | 2009-08-18 | Microsoft Corporation | Data association |
US20050188350A1 (en) | 2004-02-20 | 2005-08-25 | Microsoft Corporation | Data binding |
US7240054B2 (en) | 2004-02-27 | 2007-07-03 | International Business Machines Corporation | Techniques to preserve data constraints and referential integrity in asynchronous transactional replication of relational tables |
JP2005250820A (en) | 2004-03-04 | 2005-09-15 | Hitachi Ltd | Xml document classification method in storage system |
US20050222996A1 (en) | 2004-03-30 | 2005-10-06 | Oracle International Corporation | Managing event-condition-action rules in a database system |
US7620893B2 (en) | 2004-03-31 | 2009-11-17 | Sap Ag | Aiding a user in using a software application |
BRPI0401465A (en) | 2004-04-20 | 2006-02-21 | Embria Informatica Ltda | system for managing interactions between users and software applications in a web environment |
WO2005109284A2 (en) | 2004-05-03 | 2005-11-17 | Trintuition Llc | Apparatus and method for creating and using documents in a distributed computing network |
US8108429B2 (en) | 2004-05-07 | 2012-01-31 | Quest Software, Inc. | System for moving real-time data events across a plurality of devices in a network for simultaneous data protection, replication, and access services |
EP1594049A1 (en) * | 2004-05-07 | 2005-11-09 | Hewlett-Packard Development Company, L.P. | Web application framework |
KR100559251B1 (en) | 2004-05-12 | 2006-03-15 | 한국생산기술연구원 | Integrated service method of distribution software for robot development based on open internet network |
US7464386B2 (en) | 2004-05-17 | 2008-12-09 | Microsoft Corporation | Data controls architecture |
US7650432B2 (en) | 2004-05-20 | 2010-01-19 | Bea Systems, Inc. | Occasionally-connected application server |
US20050262185A1 (en) | 2004-05-20 | 2005-11-24 | Bea Systems, Inc. | Systems and methods for a collaboration messaging framework |
US20060031228A1 (en) | 2004-05-20 | 2006-02-09 | Bea Systems, Inc. | Adaptive user interface for occasionally-connected application server |
US20060069774A1 (en) | 2004-06-17 | 2006-03-30 | International Business Machine Corporation | Method and apparatus for managing data center using Web services |
JP4069905B2 (en) | 2004-06-28 | 2008-04-02 | コニカミノルタビジネステクノロジーズ株式会社 | Shared file management system and server |
US9098476B2 (en) * | 2004-06-29 | 2015-08-04 | Microsoft Technology Licensing, Llc | Method and system for mapping between structured subjects and observers |
US7370273B2 (en) | 2004-06-30 | 2008-05-06 | International Business Machines Corporation | System and method for creating dynamic folder hierarchies |
US9083765B2 (en) | 2004-07-02 | 2015-07-14 | Oracle International Corporation | Systems and methods of offline processing |
US7584422B2 (en) | 2004-07-12 | 2009-09-01 | Informatica Corporation | System and method for data format transformation |
EP1789892A2 (en) | 2004-08-02 | 2007-05-30 | JustSystems Corporation | A document processing and management approach to adding an exclusive plugin implementing a desired functionality |
US20060053194A1 (en) | 2004-09-03 | 2006-03-09 | Schneider Ronald E | Systems and methods for collaboration |
US20060053195A1 (en) | 2004-09-03 | 2006-03-09 | Schneider Ronald E | Systems and methods for collaboration |
US7836097B2 (en) | 2004-09-29 | 2010-11-16 | The Cleveland Clinic Foundation | Extensible database system and method |
US7730129B2 (en) | 2004-10-20 | 2010-06-01 | Inbit, Inc. | Collaborative communication platforms |
US8290977B2 (en) | 2004-10-21 | 2012-10-16 | Sybase Inc. | Database system providing methodology for execution of functions in XML queries |
US8478616B2 (en) | 2004-10-29 | 2013-07-02 | FrontRange Solutions USA Inc. | Business application development and execution environment |
US20060101064A1 (en) | 2004-11-08 | 2006-05-11 | Sharpcast, Inc. | Method and apparatus for a file sharing and synchronization system |
US7571425B2 (en) * | 2004-11-18 | 2009-08-04 | Hewlett-Packard Development Company, L.P. | Automated binding for object oriented programming user interface components |
US7574692B2 (en) * | 2004-11-19 | 2009-08-11 | Adrian Herscu | Method for building component-software for execution in a standards-compliant programming environment |
US8429192B2 (en) | 2004-12-02 | 2013-04-23 | International Business Machines Corporation | System and method for supporting a plurality of access control list types for a file system in an operating system |
US7441187B2 (en) * | 2004-12-16 | 2008-10-21 | International Business Machines Corporation | Web template processing utilizing dynamic rules defined by data structure language |
US7716260B2 (en) * | 2004-12-16 | 2010-05-11 | Oracle International Corporation | Techniques for transaction semantics for a database server performing file operations |
US7437376B2 (en) | 2004-12-20 | 2008-10-14 | Microsoft Corporation | Scalable object model |
FI20041638A0 (en) * | 2004-12-21 | 2004-12-21 | Nokia Corp | Content Sharing in a Communication System |
US7945590B2 (en) | 2005-01-06 | 2011-05-17 | Microsoft Corporation | Programmability for binding data |
WO2006077481A1 (en) | 2005-01-19 | 2006-07-27 | Truecontext Corporation | Policy-driven mobile forms applications |
US7567968B2 (en) | 2005-01-31 | 2009-07-28 | Microsoft Corporation | Integration of a non-relational query language with a relational data store |
US7660809B2 (en) | 2005-01-31 | 2010-02-09 | Microsoft Corporation | Using a file server as a central shared database |
US7752224B2 (en) | 2005-02-25 | 2010-07-06 | Microsoft Corporation | Programmability for XML data store for documents |
US7853961B2 (en) | 2005-02-28 | 2010-12-14 | Microsoft Corporation | Platform for data services across disparate application frameworks |
US20060212842A1 (en) * | 2005-03-15 | 2006-09-21 | Microsoft Corporation | Rich data-bound application |
CN101176079B (en) * | 2005-03-16 | 2011-12-07 | 航空照片技术有限公司 | Method for distributing computing between server and client |
US20060212543A1 (en) * | 2005-03-21 | 2006-09-21 | Dexterra, Inc. | Modular applications for mobile data system |
US8326877B2 (en) * | 2005-05-04 | 2012-12-04 | Microsoft Corporation | Region-based security |
JP2008545181A (en) | 2005-05-10 | 2008-12-11 | ブレント・ジェイ・アンジェリン | Internet operating system |
US20060265377A1 (en) | 2005-05-19 | 2006-11-23 | Trimergent | Personalizable information networks |
CA2508091A1 (en) * | 2005-05-20 | 2006-11-20 | Eric Richer | System and method of data brokering |
US7617500B2 (en) | 2005-05-20 | 2009-11-10 | International Business Machines Corporation | Generic framework for integrating components with different interfaces in an enterprise application integration environment |
US9104773B2 (en) | 2005-06-21 | 2015-08-11 | Microsoft Technology Licensing, Llc | Finding and consuming web subscriptions in a web browser |
US7475138B2 (en) | 2005-06-23 | 2009-01-06 | International Business Machines Corporation | Access control list checking |
US7363628B2 (en) | 2005-06-27 | 2008-04-22 | Microsoft Corporation | Data centric and protocol agnostic workflows for exchanging data between a workflow instance and a workflow host |
US20070006065A1 (en) | 2005-07-01 | 2007-01-04 | Microsoft Corporation | Conditional event timing for interactive multimedia presentations |
US7925973B2 (en) | 2005-08-12 | 2011-04-12 | Brightcove, Inc. | Distribution of content |
US7646771B2 (en) * | 2005-08-17 | 2010-01-12 | Cisco Technology, Inc. | Compilation of access control lists |
US7653617B2 (en) | 2005-08-29 | 2010-01-26 | Google Inc. | Mobile sitemaps |
US7568035B2 (en) | 2005-08-30 | 2009-07-28 | Microsoft Corporation | Command binding determination and implementation |
US20070050705A1 (en) | 2005-08-30 | 2007-03-01 | Erxiang Liu | Method of xml element level comparison and assertion utilizing an application-specific parser |
CN100568235C (en) * | 2005-09-09 | 2009-12-09 | 国际商业机器公司 | Be used to carry out instant messaging client computer and the method that project is shared |
US7831918B2 (en) | 2005-09-12 | 2010-11-09 | Microsoft Corporation | Content based user interface design |
US7606921B2 (en) | 2005-09-21 | 2009-10-20 | Sap Ag | Protocol lifecycle |
US7412534B2 (en) * | 2005-09-30 | 2008-08-12 | Yahoo! Inc. | Subscription control panel |
US20070078943A1 (en) | 2005-10-04 | 2007-04-05 | Kenneth Daniels | Message based application communication system |
US9367642B2 (en) | 2005-10-07 | 2016-06-14 | Oracle International Corporation | Flexible storage of XML collections within an object-relational database |
US20070089048A1 (en) * | 2005-10-14 | 2007-04-19 | Lacey Jon-David K | Displaying using graphics display language and native UI objects |
US20070100830A1 (en) * | 2005-10-20 | 2007-05-03 | Ganesha Beedubail | Method and apparatus for access control list (ACL) binding in a data processing system |
US20070100960A1 (en) * | 2005-10-28 | 2007-05-03 | Yahoo! Inc. | Managing content for RSS alerts over a network |
US8176081B2 (en) * | 2005-11-18 | 2012-05-08 | International Business Machines Corporation | Forms integration of an external data model not implemented through a document object model (DOM) accessible application programming interface (API) |
US8099716B2 (en) * | 2005-11-28 | 2012-01-17 | Ubiquity Software Corporation Limited | Service structured application development architecture |
WO2007068147A1 (en) * | 2005-12-17 | 2007-06-21 | Intel Corporation | Installing and executing shared applications in shared folders |
US7533111B2 (en) | 2005-12-30 | 2009-05-12 | Microsoft Corporation | Using soap messages for inverse query expressions |
US20070174429A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
CN101008970A (en) * | 2006-01-24 | 2007-08-01 | 鸿富锦精密工业(深圳)有限公司 | Authority management and control method and system thereof |
US7913234B2 (en) | 2006-02-13 | 2011-03-22 | Research In Motion Limited | Execution of textually-defined instructions at a wireless communication device |
US8151323B2 (en) | 2006-04-12 | 2012-04-03 | Citrix Systems, Inc. | Systems and methods for providing levels of access and action control via an SSL VPN appliance |
US20070250927A1 (en) | 2006-04-21 | 2007-10-25 | Wintutis, Inc. | Application protection |
US7853573B2 (en) | 2006-05-03 | 2010-12-14 | Oracle International Corporation | Efficient replication of XML data in a relational database management system |
US7675857B1 (en) | 2006-05-03 | 2010-03-09 | Google Inc. | Method and apparatus to avoid network congestion |
US20070266111A1 (en) * | 2006-05-12 | 2007-11-15 | Schubert Gunter H | Web-internet operating system-the next dimension of internet logic |
CN101356494B (en) | 2006-05-16 | 2013-01-09 | 捷讯研究有限公司 | System and method of skinning the user interface of an application |
US7539672B2 (en) * | 2006-05-26 | 2009-05-26 | International Business Machines Corporation | Apparatus, system, and method for direct retrieval of hierarchical data from SAP using dynamic queries |
US7650390B2 (en) | 2006-06-01 | 2010-01-19 | Roam Data Inc | System and method for playing rich internet applications in remote computing devices |
US7752212B2 (en) * | 2006-06-05 | 2010-07-06 | International Business Machines Corporation | Orthogonal Integration of de-serialization into an interpretive validating XML parser |
US20070288853A1 (en) | 2006-06-09 | 2007-12-13 | Nextair Corporation | Software, methods and apparatus facilitating presentation of a wireless communication device user interface with multi-language support |
US8395652B1 (en) | 2006-06-28 | 2013-03-12 | Insors Integrated Communications | Data network collaboration systems having a shared file |
US20080027940A1 (en) | 2006-07-27 | 2008-01-31 | Microsoft Corporation | Automatic data classification of files in a repository |
US7831707B2 (en) | 2006-08-02 | 2010-11-09 | Scenera Technologies, Llc | Methods, systems, and computer program products for managing electronic subscriptions |
WO2008017001A2 (en) | 2006-08-02 | 2008-02-07 | Moka5, Inc. | Sharing live appliances |
US7861213B2 (en) | 2006-09-05 | 2010-12-28 | Oracle International Corporation | Mechanism for developing AJax applications using java swing framework and method for using the same |
US20090066348A1 (en) | 2006-09-06 | 2009-03-12 | Young Shik Shin | Apparatus and method for quantitative determination of target molecules |
SG141289A1 (en) * | 2006-09-29 | 2008-04-28 | Wireless Intellect Labs Pte Lt | An event update management system |
US8863083B2 (en) * | 2006-10-10 | 2014-10-14 | Sap Ag | Presenting user interfaces based on messages |
US7599920B1 (en) | 2006-10-12 | 2009-10-06 | Google Inc. | System and method for enabling website owners to manage crawl rate in a website indexing system |
US7882077B2 (en) * | 2006-10-17 | 2011-02-01 | Commvault Systems, Inc. | Method and system for offline indexing of content and classifying stored data |
US7814234B2 (en) | 2006-10-30 | 2010-10-12 | Microsoft Corporation | Offline execution of web based applications |
WO2008073618A2 (en) | 2006-11-06 | 2008-06-19 | Devicevm, Inc. | Instant on platform |
US20080120319A1 (en) | 2006-11-21 | 2008-05-22 | International Business Machines Corporation | System and method for identifying computer users having files with common attributes |
US7886270B2 (en) * | 2006-11-28 | 2011-02-08 | International Business Machines Corporation | Methods, systems, and computer program products for file version control management |
US8015581B2 (en) | 2007-01-05 | 2011-09-06 | Verizon Patent And Licensing Inc. | Resource data configuration for media content access systems and methods |
US7725489B2 (en) | 2007-01-31 | 2010-05-25 | Noryan Holding Corporation | Node for providing a file service to a mobile terminal |
US20080195622A1 (en) | 2007-02-12 | 2008-08-14 | Personeta Ltd. | Service provisioning system |
US7802128B2 (en) | 2007-03-26 | 2010-09-21 | Oracle International Corporation | Method to avoid continuous application failovers in a cluster |
US20080263141A1 (en) | 2007-04-20 | 2008-10-23 | Demesa Jesse | Systems and Methods to Generate Web Server Files From Generic View Definitions |
US20080301685A1 (en) | 2007-05-31 | 2008-12-04 | Novell, Inc. | Identity-aware scheduler service |
US8037484B2 (en) * | 2007-07-03 | 2011-10-11 | International Business Machines Corporation | Building compound extensible AJAX applications |
US8868499B2 (en) * | 2007-08-15 | 2014-10-21 | Salesforce.Com, Inc. | Method and system for pushing data to subscribers in an on-demand service |
US8321508B2 (en) * | 2007-09-25 | 2012-11-27 | International Business Machines Corporation | Controlling collaboration participation |
WO2009043030A2 (en) | 2007-09-28 | 2009-04-02 | Xcerion Aktiebolag | Network operating system |
US20090106052A1 (en) | 2007-10-22 | 2009-04-23 | Eytan Moldovan | Computerized acquisition and compilation of vehicle accident information |
US7917584B2 (en) | 2007-10-22 | 2011-03-29 | Xcerion Aktiebolag | Gesture-based collaboration |
US8108465B2 (en) * | 2007-10-31 | 2012-01-31 | Oracle America, Inc. | Method and system for request processing |
US20090172710A1 (en) * | 2007-12-28 | 2009-07-02 | Arman Toorians | Method and system for enabling a mini program on a computing device to access an auxiliary system |
US8126869B2 (en) * | 2008-02-08 | 2012-02-28 | Microsoft Corporation | Automated client sitemap generation |
US9003059B2 (en) | 2008-03-31 | 2015-04-07 | Microsoft Technology Licensing, Llc | Running applications in an online or offline mode based on the availability of the connection to the remote web server |
JP4640470B2 (en) * | 2008-08-18 | 2011-03-02 | ソニー株式会社 | Image processing apparatus, image processing method, program, and imaging apparatus |
-
2008
- 2008-09-29 WO PCT/US2008/078166 patent/WO2009043030A2/en active Application Filing
- 2008-09-29 KR KR1020107009419A patent/KR20100091165A/en not_active Application Discontinuation
- 2008-09-29 KR KR1020107009416A patent/KR101501174B1/en active IP Right Grant
- 2008-09-29 US US12/240,812 patent/US8688627B2/en active Active
- 2008-09-29 WO PCT/US2008/078173 patent/WO2009043037A2/en active Application Filing
- 2008-09-29 WO PCT/US2008/078169 patent/WO2009043033A2/en active Application Filing
- 2008-09-29 EP EP08833104.6A patent/EP2206048A4/en not_active Withdrawn
- 2008-09-29 US US12/240,915 patent/US8280925B2/en active Active
- 2008-09-29 BR BRPI0818194A patent/BRPI0818194A2/en not_active IP Right Cessation
- 2008-09-29 US US12/240,883 patent/US8615531B2/en active Active
- 2008-09-29 WO PCT/US2008/078171 patent/WO2009043035A2/en active Application Filing
- 2008-09-29 US US12/240,841 patent/US8843942B2/en active Active
- 2008-09-29 US US12/240,897 patent/US8234315B2/en active Active
- 2008-09-29 BR BRPI0817475A patent/BRPI0817475A2/en not_active IP Right Cessation
- 2008-09-29 BR BRPI0817473A patent/BRPI0817473A2/en not_active IP Right Cessation
- 2008-09-29 KR KR1020107009412A patent/KR20100080822A/en not_active Application Discontinuation
- 2008-09-29 EP EP08833530.2A patent/EP2206049A4/en not_active Withdrawn
- 2008-09-29 US US12/240,866 patent/US8239511B2/en active Active
- 2008-09-29 US US12/240,871 patent/US8959123B2/en active Active
- 2008-09-29 US US12/240,854 patent/US8954526B2/en active Active
- 2008-09-29 US US12/240,901 patent/US20090193410A1/en not_active Abandoned
- 2008-09-29 US US12/240,888 patent/US9071623B2/en active Active
- 2008-09-29 US US12/240,902 patent/US8099671B2/en active Active
- 2008-09-29 US US12/240,898 patent/US9344497B2/en active Active
- 2008-09-29 US US12/240,869 patent/US20090172715A1/en not_active Abandoned
- 2008-09-29 US US12/240,820 patent/US9621649B2/en active Active
- 2008-09-29 EP EP08833828.0A patent/EP2206050A4/en not_active Withdrawn
- 2008-09-29 US US12/240,884 patent/US8156146B2/en active Active
- 2008-09-29 US US12/240,786 patent/US8108426B2/en active Active
- 2008-09-29 EP EP08834114A patent/EP2206051A2/en not_active Withdrawn
- 2008-09-29 WO PCT/US2008/078164 patent/WO2009043029A2/en active Application Filing
- 2008-09-29 US US12/240,836 patent/US8996459B2/en active Active
- 2008-09-29 KR KR1020107009410A patent/KR20100068473A/en not_active Application Discontinuation
- 2008-09-29 US US12/240,922 patent/US8112460B2/en active Active
- 2008-09-29 BR BRPI0817528A patent/BRPI0817528A2/en not_active IP Right Cessation
- 2008-09-29 US US12/240,759 patent/US8620863B2/en active Active
- 2008-09-29 US US12/240,877 patent/US20090158142A1/en not_active Abandoned
- 2008-09-29 KR KR1020107009420A patent/KR101525220B1/en active IP Right Grant
- 2008-09-29 US US12/240,900 patent/US8738567B2/en active Active
-
2015
- 2015-06-29 US US14/754,512 patent/US20160028808A1/en not_active Abandoned
-
2021
- 2021-01-22 US US17/156,430 patent/US11838358B2/en active Active
-
2023
- 2023-10-12 US US18/486,031 patent/US20240223653A1/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6223345B1 (en) * | 1999-08-30 | 2001-04-24 | J.D. Edwards World Source Company | System and method for building client and server application packages |
WO2002097616A1 (en) * | 2001-05-22 | 2002-12-05 | Nanyang University | Collaborative virtual enivonment system and method |
US20050091655A1 (en) * | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Associating runtime objects with a set and controlling access to resources as a function thereof |
US20050114871A1 (en) * | 2003-11-24 | 2005-05-26 | Wolff Adam G. | System for optimizing application start-up |
US20050289531A1 (en) * | 2004-06-08 | 2005-12-29 | Daniel Illowsky | Device interoperability tool set and method for processing interoperability application specifications into interoperable application packages |
US20060150188A1 (en) * | 2004-12-21 | 2006-07-06 | Manuel Roman | Method and apparatus for supporting soft real-time behavior |
US20080201701A1 (en) * | 2006-10-03 | 2008-08-21 | Salesforce.Com, Inc. | Methods and systems for upgrading and installing application packages to an application platform |
US20080128715A1 (en) * | 2006-11-30 | 2008-06-05 | Clark Williams | Optimization utility for developing embedded systems |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020243420A1 (en) * | 2019-05-29 | 2020-12-03 | TADA Cognitive Solutions, LLC | Digital duplicate |
US10909160B2 (en) | 2019-05-29 | 2021-02-02 | TADA Cognitive Solutions, LLC | Digital duplicate |
US12019668B2 (en) | 2019-05-29 | 2024-06-25 | TADA Cognitive Solutions, LLC | Digital duplicate |
US11163613B2 (en) | 2019-07-23 | 2021-11-02 | International Business Machines Corporation | Automated system integration |
US11301573B2 (en) | 2019-08-19 | 2022-04-12 | TADA Cognitive Solutions, LLC | Data security using semantic services |
US11461293B2 (en) | 2019-08-19 | 2022-10-04 | TADA Cognitive Solutions, LLC | Processes and systems for onboarding data for a digital duplicate |
US20230177025A1 (en) * | 2019-08-19 | 2023-06-08 | TADA Cognitive Solutions, LLC | Processes and systems for onboarding data for a digital duplicate |
US11727129B2 (en) | 2019-08-19 | 2023-08-15 | TADA Cognitive Solutions, LLC | Data security using semantic services |
US11886395B2 (en) * | 2019-08-19 | 2024-01-30 | TADA Cognitive Solutions, LLC | Processes and systems for onboarding data for a digital duplicate |
US11580479B2 (en) | 2020-09-04 | 2023-02-14 | TADA Cognitive Solutions, LLC | Master network techniques for a digital duplicate |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11838358B2 (en) | Network operating system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STCV | Information on status: appeal procedure |
Free format text: EXAMINER'S ANSWER TO APPEAL BRIEF MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL AWAITING BPAI DOCKETING |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |