Towards Dependable Dynamic Component-Based Applications

Total Page:16

File Type:pdf, Size:1020Kb

Towards Dependable Dynamic Component-Based Applications THÈSE Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ DE GRENOBLE Spécialité : Informatique Arrêté ministériel : 7 août 2006 Présentée par Kiev SANTOS DA GAMA Thèse dirigée par Didier DONSEZ préparée au sein du Laboratoire d’Informatique de Grenoble dans l'École Doctorale Mathématiques, Sciences et Technologies de l’Information, Informatique (MSTII) Towards Dependable Dynamic Component-based Applications Thèse soutenue publiquement le « 6 Octobre 2011», devant le jury composé de : Mme Claudia RONCANCIO Professeur, Ensimag - Grenoble INP, Président M Gilles MULLER Directeur de Recherche, INRIA, Rapporteur M Lionel SEINTURIER Professeur, Université de Lille & IUF, Rapporteur M Ivica CRNKOVIC Professor, Mälardalen University, Membre M Didier DONSEZ Professeur, Université Joseph Fourier, Membre M Gaël THOMAS Maître de Conférences, Université Pierre et Marie Curie, Membre M Peter KRIENS Technical Director, OSGi Alliance, Invité ABSTRACT Software is moving towards evolutionary architectures that are able to easily accommodate changes and integrate new functionality. This is important in a wide range of applications, from plugin-based end user applications to critical applications with high availability requirements. Dynamic component-based platforms allow software to evolve at runtime, by allowing components to be loaded, and executed without forcing applications to be restarted. However, the flexibility of such mechanism demands applications to cope with errors due to inconsistencies in the update process, or due to faulty behavior from components introduced during execution. This is mainly true when dealing with third-party components, making it harder to predict the impacts (e.g., runtime incompatibilities, application crashes) and to maintain application dependability when integrating such third-party code into the application. Components whose origin or quality attributes are unknown could be considered as untrustworthy since they can potentially introduce faults to applications when combined with other components, even if unintentionally. The quality of components is harder to evaluate when components are combined together, especially if it happens on-the-fly. We are interested in reducing the impact that can be brought by untrustworthy components deployed at runtime and that would potentially compromise application dependability. This thesis focuses on applying techniques for moving a step forward towards dependable dynamic component-based applications by addressing different dependability attributes namely reliability, maintainability and availability. We propose the utilization of strong component isolation boundaries, by providing a fault-contained environment for separately running untrustworthy components. Our solution combines three approaches: (i) the dynamic isolation of components, governed by a runtime reconfigurable policy; (ii) a self-healing component isolation container; and (iii) the usage of aspects for separating dependability concerns from functional code. Keywords: Dependability, Component-based development, Self-healing, Application isolation, Aspect-oriented Programming, Dynamic component-based applications RÉSUMÉ Les logiciels s'orientent de plus en plus vers des architectures évolutives, capables de s'adapter facilement aux changements et d'intégrer de nouvelles fonctionnalités. Ceci est important pour plusieurs classes d'applications qui ont besoin d‘évoluer sans que cela implique d’interrompre leur exécution. Des plateformes dynamiques à composants autorisent ce type d'évolution à l'exécution, en permettant aux composants d'être chargés et exécutés sans requérir le redémarrage complet de l’application en service. Toutefois, la flexibilité d'un tel mécanisme introduit de nouveaux défis qui exigent de gérer les possibles erreurs dues à des incohérences dans le processus de mise à jour, ou en raison du comportement défectueux de composants survenant pendant l'exécution de l’application. Des composants tiers dont l'origine ou la qualité sont inconnus peuvent être considérées a priori comme peu fiables, car ils peuvent potentiellement introduire des défauts d'applications lorsqu'il est combiné avec d'autres composants. Nous sommes intéressés à la réduction de l'impact de ces composants considérés comme non fiables et qui sont susceptibles de compromettre la fiabilité de l’application en cours d’exécution. Cette thèse porte sur l'application de techniques pour améliorer la fiabilité des applications dynamiques à composants. Pour cela, nous proposons l'utilisation des frontières d'isolation pouvant fournir du contingentement de fautes. Le composant ainsi isolé ne perturbe pas le reste de l’application quand il est défaillant. Une telle approche peut être vu sous trois perspectives présentées: (i) l'isolement des composants dynamiques, régi par une politique d'exécution reconfigurable, (ii) l'autoréparation de conteneurs d‘isolement, et (iii) l'utilisation des aspects pour séparer les préoccupations de fiabilité à partir du code fonctionnel. Mots-clés : Fiabilité, Développement basé sur des composants, Autoréparation, Isolation des applications, Programmation orientée aspects, Plateforme dynamiques à composants. ! Acknowledgements I would like to thank the members of the jury for accepting to evaluate my work: Gilles Muller et Lionel Seinturier for being rapporteurs, which means a significant amount of work. I also thank Claudia Roncancio, Ivica Crnkovic and Gaël Thomas for accepting to participate as examiners of my thesis. Thanks also to Peter Kriens, who could manage to participate through video conferencing software since he had to be at California at that time (which force him to wake up at 4 AM). Remerciements Je voudrais remercier les directeurs de l’équipe Adèle, Jacky Estublier et Philippe Lalanda, pour m’avoir accueilli dans l’équipe. Et, bien sûr, mon directeur de thèse Didier Donsez pour son aide dans des diverses aspects. Je remercie tous les membres de l’équipe Adèle pour leur amitié. Je tiens particulièrement à remercier Walter Rudametkin, Johann Bourcier et Jonathan Bardin pour des nombreuses discussions qui m’ont beaucoup aidé, spécialement les dernières discussions avec Walter et Jo pendant la rédaction de ma thèse. Merci à Yoann Maurel qui m’a aussi aidé à donner une meilleure perspective dans quelques aspects de mon travail. Merci à Stéphanie, Vincent et German pour m’avoir aidé à raffiner le discours et la présentation de mes diapos. Merci aussi aux autres amis avec qui j’ai travaillé et beaucoup discuté sur des choses pas toujours dans le domaine de ma thèse : Lionel Touseau, Gabriel Pedraza et Thomas Lévêque. Un grand merci à tous les autres avec qui je n’ai pas directement travaillé: Noé Torito, Diana, El Mehdi, Antonin, Eric, Idrissa, Pierre B. , P. Alain, Bassem, Marc, Joao, Ozan Hipne, Etienne, Clémént ainsi que tous les autres qui avaient passé par l’équipe pendant que j’étais là. Pendant mon doctorat j’ai pu aussi exercer des activités d’enseignement comme moniteur à l’Ensimag, et je remercie à Claudia pour avoir accepté d’être ma tutrice de monitorat. Elle m’a beaucoup aidé dans ce trajet, et m’a même trouvé des heures de travail avec elle dans l’équipe BD. Merci aussi à tous les enseignants avec qui je travaillé pendant cette période. Je tiens à remercier Laurent Daynès pour son aide au début de cette thèse, et à Olivier Gattaz pour m’avoir rassuré qu’il existe un intérêt de ce travail dans un contexte industriel. Je remercie aussi André Bottaro et Olivier Beyler pour m’avoir permit de présenter chez Orange mes travaux de recherche, et d’avoir un avis critique donné par son équipe lors de cet exposé. Pendant la rédaction j’ai eu l’aide de Nicolas Palix, et mes amis manauaras Jander et Raquel qui ont pu faire des relectures de quelques chapitres de mon manuscrit de thèse, en me donnant des suggestions et des petites corrections. Merci à vous tous. Je remercie à toute ma famille et mes amis d’ici et du Brésil pour leur support et les mots d’encouragement. Plus directement lié au travail de cette thèse, je remercie Fabio Souza, Fernando Castor et Nelson Rosa, pour leurs remarques ainsi que tout genre d’aide pendant mes visites à Recife. Merci à ma femme pour l'énorme sacrifice d'avoir resté en France pendant 4 ans. Elle n'a jamais voulu venir, et l'interruption de sa carrière a été un geste d'amour et d'altruisme. Toute cette période a été très difficile pour elle et par conséquent pour moi aussi. Finalement, un grand merci à notre petite Marina, qui est née pendant ce doctorat et qui nous a apporté beaucoup de bonheur. Merci au modafinil pour m'avoir aidé à rester reveillé pendant la rédaction Muito obrigado a todos vocês! Sentirei saudades dos amigos que fiz em Grenoble. ﺷ ﻜﺮا ,Merci, gracias Table of Contents CHAPTER 1 INTRODUCTION ................................................................................................................ 13 1.1 MOTIVATIONS ........................................................................................................................................ 13 1.2 OBJECTIVES ............................................................................................................................................. 15 1.3 WHAT THIS THESIS IS NOT ABOUT ......................................................................................................... 15 1.4 DIAGRAMS NOTATION ........................................................................................................................... 16 1.5 DOCUMENT STRUCTURE .......................................................................................................................
Recommended publications
  • Using Emergent Team Structure to Focus Collaboration
    Using Emergent Team Structure to Focus Collaboration by Shawn Minto B.Sc, The University of British Columbia, 2005 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Science The Faculty of Graduate Studies (Computer Science) The University Of British Columbia January 30, 2007 © Shawn Minto 2007 ii Abstract To build successful complex software systems, developers must collaborate with each other to solve issues. To facilitate this collaboration specialized tools are being integrated into development environments. Although these tools facilitate collaboration, they do not foster it. The problem is that the tools require the developers to maintain a list of other developers with whom they may wish to communicate. In any given situation, it is the developer who must determine who within this list has expertise for the specific situation. Unless the team is small and static, maintaining the knowledge about who is expert in particular parts of the system is difficult. As many organizations are beginning to use agile development and distributed software practices, which result in teams with dynamic membership, maintaining this knowledge is impossible. This thesis investigates whether emergent team structure can be used to support collaboration amongst software developers. The membership of an emergent team is determined from analysis of software artifacts. We first show that emergent teams exist within a particular open-source software project, the Eclipse integrated development environment. We then present a tool called Emergent Expertise Locator (EEL) that uses emergent team information to propose experts to a developer within their development environment as the developer works. We validated this approach to support collaboration by applying our ap• proach to historical data gathered from the Eclipse project, Firefox and Bugzilla and comparing the results to an existing heuristic for recommending experts that produces a list of experts based on the revision history of individual files.
    [Show full text]
  • Security Distributed and Networking Systems (507 Pages)
    Security in ................................ i Distri buted and /Networking.. .. Systems, . .. .... SERIES IN COMPUTER AND NETWORK SECURITY Series Editors: Yi Pan (Georgia State Univ., USA) and Yang Xiao (Univ. of Alabama, USA) Published: Vol. 1: Security in Distributed and Networking Systems eds. Xiao Yang et al. Forthcoming: Vol. 2: Trust and Security in Collaborative Computing by Zou Xukai et al. Steven - Security Distributed.pmd 2 5/25/2007, 1:58 PM Computer and Network Security Vol. 1 Security in i Distri buted and /Networking . Systems Editors Yang Xiao University of Alabama, USA Yi Pan Georgia State University, USA World Scientific N E W J E R S E Y • L O N D O N • S I N G A P O R E • B E I J I N G • S H A N G H A I • H O N G K O N G • TA I P E I • C H E N N A I Published by World Scientific Publishing Co. Pte. Ltd. 5 Toh Tuck Link, Singapore 596224 USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601 UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. SECURITY IN DISTRIBUTED AND NETWORKING SYSTEMS Series in Computer and Network Security — Vol. 1 Copyright © 2007 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the Publisher.
    [Show full text]
  • Peer Participation and Software
    Peer Participation and Software This report was made possible by the grants from the John D. and Cath- erine T. MacArthur Foundation in connection with its grant-making initiative on Digital Media and Learning. For more information on the initiative visit www.macfound.org. The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning Peer Participation and Software: What Mozilla Has to Teach Government by David R. Booth The Future of Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones The Future of Thinking: Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones New Digital Media and Learning as an Emerging Area and “Worked Examples” as One Way Forward by James Paul Gee Living and Learning with New Media: Summary of Findings from the Digital Youth Project by Mizuko Ito, Heather Horst, Matteo Bittanti, danah boyd, Becky Herr-Stephenson, Patricia G. Lange, C. J. Pascoe, and Laura Robinson with Sonja Baumer, Rachel Cody, Dilan Mahendran, Katynka Z. Martínez, Dan Perkel, Christo Sims, and Lisa Tripp Young People, Ethics, and the New Digital Media: A Synthesis from the GoodPlay Project by Carrie James with Katie Davis, Andrea Flores, John M. Francis, Lindsay Pettingill, Margaret Rundle, and Howard Gardner Confronting the Challenges of Participatory Culture: Media Education for the 21st Century by Henry Jenkins (P.I.) with Ravi Purushotma, Margaret Weigel, Katie Clinton, and Alice J. Robison The Civic Potential of Video Games by Joseph Kahne, Ellen Middaugh, and Chris Evans Peer Production and Software What Mozilla Has to Teach Government David R.
    [Show full text]
  • Organizational Search in Email Systems Sruthi Bhushan Pitla Western Kentucky University, [email protected]
    Western Kentucky University TopSCHOLAR® Masters Theses & Specialist Projects Graduate School 5-2012 Organizational Search in Email Systems Sruthi Bhushan Pitla Western Kentucky University, [email protected] Follow this and additional works at: http://digitalcommons.wku.edu/theses Part of the Databases and Information Systems Commons Recommended Citation Pitla, Sruthi Bhushan, "Organizational Search in Email Systems" (2012). Masters Theses & Specialist Projects. Paper 1161. http://digitalcommons.wku.edu/theses/1161 This Thesis is brought to you for free and open access by TopSCHOLAR®. It has been accepted for inclusion in Masters Theses & Specialist Projects by an authorized administrator of TopSCHOLAR®. For more information, please contact [email protected]. ORGANIZATIONAL SEARCH IN EMAIL SYSTEMS A Thesis Presented to The Faculty of the Department of Mathematics and Computer Science Western Kentucky University Bowling Green, Kentucky In Partial Fulfillment Of the Requirements for the Degree Master of Science By Sruthi Bhushan Pitla May 2012 ACKNOWLEDGMENTS It was a great pleasure working under my graduate advisor, Dr. Guangming Xing, who provided me with everything I need to succeed. His inspiration and guidance at each and every step made this Master of Science degree so rewarding and satisfactory. He always encouraged my work in every possible way and also gave me the freedom to express and implement my ideas without any restrictions. I feel very fortunate and proud to have been his student and really think the experience which I gained working under him is invaluable. I would like to whole heartedly thank Dr. Xing for the immense trust and patience he has over me.
    [Show full text]
  • Bachelorarbeit
    BACHELORARBEIT Frau Kristina Martin Extraktion von Passworthashes und Ermittlung von Passwörtern aus Browserapplikationen im Rahmen der Post-Mortem-Analyse 2018 Fakultät Angewandte Computer- und Biowissenschaften BACHELORARBEIT Extraktion von Passworthashes und Ermittlung von Passwörtern aus Browserapplikationen im Rahmen der Post-Mortem-Analyse Autorin: Kristina Martin Studiengang: Allgemeine und digitale Forensik Seminargruppe: FO15w3-B Betreuer der Hochschule:: Prof. Dr. rer. nat. Christian Hummert Betreuer am Landeskriminalamt Thüringen: Dipl.-Inf. Andreas Sommer Mittweida, August 2018 Faculty Applied Computer Sciences & Biosciences BACHELOR THESIS Extraction of Password Hashes and Decryption of Passwords stored by Browser Applications on the Basis of a Post-Mortem-Analysis Authorin: Kristina Martin Study Programme: General and Digital Forensic Science Seminar Group: FO15w3-B First Referee:: Prof. Dr. rer. nat. Christian Hummert Second Referee: Dipl.-Inf. Andreas Sommer Mittweida, August 2018 Bibliografische Angaben Martin, Kristina: Extraktion von Passworthashes und Ermittlung von Passwörtern aus Browser- applikationen im Rahmen der Post-Mortem-Analyse, 95 Seiten, 49 Abbildungen, Hochschule Mittweida, University of Applied Sciences, Fakultät Angewandte Computer- und Biowissen- schaften Bachelorarbeit, 2018 Dieses Werk ist urheberrechtlich geschützt. Referat Die vorliegende Arbeit erläutert, wo Browser gespeicherte Nutzerpasswörter ablegen und wie die- se zu entschlüsseln sind. Die Untersuchungen beziehen sich auf die vier derzeit meistgenutzten Browser Deutschlands, namentlich Google Chrome, Mozilla Firefox, Internet Explorer und Mi- crosoft Edge. Dabei wird auf diverse Verschlüsselungs-, Hashing- und Kodierungsverfahren ein- gegangen, die bei der Ver- und Entschlüsselung von Bedeutung sind. Insbesondere die Windows- eigene Data Protection API spielt eine übergeordnete Rolle bei der sicheren Speicherung von Passwörtern. Weiterführend wird die Entwicklung eines Programmes beschrieben, das die Browser-Passwörter per Knopfdruck aus Dateien bzw.
    [Show full text]
  • Firefox Hacks Is Ideal for Power Users Who Want to Maximize The
    Firefox Hacks By Nigel McFarlane Publisher: O'Reilly Pub Date: March 2005 ISBN: 0-596-00928-3 Pages: 398 Table of • Contents • Index • Reviews Reader Firefox Hacks is ideal for power users who want to maximize the • Reviews effectiveness of Firefox, the next-generation web browser that is quickly • Errata gaining in popularity. This highly-focused book offers all the valuable tips • Academic and tools you need to enjoy a superior and safer browsing experience. Learn how to customize its deployment, appearance, features, and functionality. Firefox Hacks By Nigel McFarlane Publisher: O'Reilly Pub Date: March 2005 ISBN: 0-596-00928-3 Pages: 398 Table of • Contents • Index • Reviews Reader • Reviews • Errata • Academic Copyright Credits About the Author Contributors Acknowledgments Preface Why Firefox Hacks? How to Use This Book How This Book Is Organized Conventions Used in This Book Using Code Examples Safari® Enabled How to Contact Us Got a Hack? Chapter 1. Firefox Basics Section 1.1. Hacks 1-10 Section 1.2. Get Oriented Hack 1. Ten Ways to Display a Web Page Hack 2. Ten Ways to Navigate to a Web Page Hack 3. Find Stuff Hack 4. Identify and Use Toolbar Icons Hack 5. Use Keyboard Shortcuts Hack 6. Make Firefox Look Different Hack 7. Stop Once-Only Dialogs Safely Hack 8. Flush and Clear Absolutely Everything Hack 9. Make Firefox Go Fast Hack 10. Start Up from the Command Line Chapter 2. Security Section 2.1. Hacks 11-21 Hack 11. Drop Miscellaneous Security Blocks Hack 12. Raise Security to Protect Dummies Hack 13. Stop All Secret Network Activity Hack 14.
    [Show full text]
  • PDF Link Forces Download Instead of Open Document PDF Link Forces
    PDF link forces download instead of open document • mozillaZine Forums http://forums.mozillazine.org/viewtopic.php?f=3&t=3010157&p=14636... Logout [ Andy Boze ] PDF link forces download instead of open document 0 new messages Post a reply User Control Panel View your posts First unread post • 13 posts • Page 1 of 1 Reply with quote ( ./posting.php?mode=quote&f=3&p=14631197 ) FAQ / Rules Report this post ( ./report.php?f=3&p=14631197 ) Members / Staff Posted Wed Jun 15, 2016 8:07 am A website I'm forced to use offers letters as pdf document. They might not want to pay for stamps and/or postage handling. When I click the link I do not get an open pdf document dialogue, but am forced to save the document Search locally. I then have to go to that location before I can open the document. When I complained about this procedure I got the answer that "this function differs per browser" and was invited to use a different browser... Boards (Advanced): I am not quite clear what has to happen behind the scenes to offer a pdf document from a database to the user, but forcing the user to another browser is a bit stiff in my opinion. Knowledge Base: Anyone care to comment? Mozilla/5.0 (Windows NT 10.0; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 SeaMonkey/2.40 Reply with quote ( ./posting.php?mode=quote&f=3&p=14631263 ) Report this post ( ./report.php?f=3&p=14631263 ) Posted Wed Jun 15, 2016 9:07 am Do other PDFs open in the browser for you? knowledge base If not, I like to install pdf.js ( https://github.com/mozilla/pdf.js/ ) in SeaMonkey to open PDFs (it's built into Firefox) - the XPI is here.
    [Show full text]
  • Javascript: the First 20 Years
    JavaScript: The First 20 Years ALLEN WIRFS-BROCK, Wirfs-Brock Associates, Inc., USA BRENDAN EICH, Brave Software, Inc., USA Shepherds: Sukyoung Ryu, KAIST, South Korea Richard P. Gabriel: poet, writer, computer scientist How a sidekick scripting language for Java, created at Netscape in a ten-day hack, ships first as a de facto Web standard and eventually becomes the world’s most widely used programming language. This paper tells the story of the creation, design, evolution, and standardization of the JavaScript language over the period of 1995–2015. But the story is not only about the technical details of the language. It is also the story of how people and organizations competed and collaborated to shape the JavaScript language which dominates the Web of 2020. CCS Concepts: • General and reference ! Computing standards, RFCs and guidelines; • Information systems ! World Wide Web; • Social and professional topics ! History of computing; History of programming languages; • Software and its engineering ! General programming languages; Scripting languages. Additional Key Words and Phrases: JavaScript, ECMAScript, Standards, Web browsers, Browser game theory, History of programming languages ACM Reference Format: Allen Wirfs-Brock and Brendan Eich. 2020. JavaScript: The First 20 Years. Proc. ACM Program. Lang. 4, HOPL (June 2020), 190 pages. https://doi.org/10.1145/3386327 1 INTRODUCTION In 2020, the World Wide Web is ubiquitous with over a billion websites accessible from billions of Web-connected devices. Each of those devices runs a Web browser or similar program which is able to process and display pages from those sites. The majority of those pages embed or load source code written in the JavaScript programming language.
    [Show full text]
  • Designing for Extensibility and Planning for Conflict
    Designing for Extensibility and Planning for Conflict: Experiments in Web-Browser Design Benjamin S. Lerner A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2011 Program Authorized to Offer Degree: UW Computer Science & Engineering University of Washington Graduate School This is to certify that I have examined this copy of a doctoral dissertation by Benjamin S. Lerner and have found that it is complete and satisfactory in all respects, and that any and all revisions required by the final examining committee have been made. Chair of the Supervisory Committee: Daniel Grossman Reading Committee: Daniel Grossman Steven Gribble John Zahorjan Date: In presenting this dissertation in partial fulfillment of the requirements for the doctoral degree at the University of Washington, I agree that the Library shall make its copies freely available for inspection. I further agree that extensive copying of this dissertation is allowable only for scholarly purposes, consistent with “fair use” as prescribed in the U.S. Copyright Law. Requests for copying or reproduction of this dissertation may be referred to Proquest Information and Learning, 300 North Zeeb Road, Ann Arbor, MI 48106-1346, 1-800-521-0600, to whom the author has granted “the right to reproduce and sell (a) copies of the manuscript in microform and/or (b) printed copies of the manuscript made from microform.” Signature Date University of Washington Abstract Designing for Extensibility and Planning for Conflict: Experiments in Web-Browser Design Benjamin S. Lerner Chair of the Supervisory Committee: Associate Professor Daniel Grossman UW Computer Science & Engineering The past few years have seen a growing trend in application development toward “web ap- plications”, a fuzzy category of programs that currently (but not necessarily) run within web browsers, that rely heavily on network servers for data storage, and that are developed and de- ployed differently from traditional desktop applications.
    [Show full text]
  • Firefox Rss Feed Notification
    Firefox Rss Feed Notification Nicky reprices his sociopaths plod briskly, but snootiest Krishna never abridged so round-arm. Which Chandler headquarter so outwards that Magnum demark her acronym? Ganglier and etymological Rufus tastes while explicable Quill fool her repleteness actinically and tellurized flop. Feeder Get this Extension for Firefox en-US. Does Firefox support RSS? Provide an RSS feed be an alternative to the email notifications. RSS Feeds Overview Powered by Kayako fusion Help Desk. You are rss feeds from firefox, they probably the entire ui. RSS reader setup examples Intel. The feed for basic features than visiting each member yet? It does not be able to use the technology we want to divide feeds the old messages with the browser forks where he want. Download Feedly Notifier for Firefox A lightweight yet not useful Firefox extension that keeps you west to spread with the RSS feed while your. Feedbro Get this Extension for Firefox en-US. RSS Really Simple Syndication feeds provide news headlines brief article. Simple RSS notifier mozillaZine Forums. List manually check this rss feeds, firefox is for professionals who published, firefox rss anymore then automatically enrolled in madison, you need a feature is. I could also copper the RSS to notifyme and get SMS notifications or updates directly to. 5 Best RSS feed reader extensions or applications that. You choose the. Of notifications of the notification support in my hands, it wakes up in ubuntu software centre of what is the feed? Choose how to answer your web push notifications title first and notification text. If you want frequent use the copy and past url method choose preview in Firefox This will.
    [Show full text]
  • Browser Support & Configuration Chrome Settings
    http://support.cayuse.com/print/book/export/html/546 Published on Cayuse Support (http://support.cayuse.com) Home > Browser Support & Configuration Browser Support & Configuration The Research Suite is supported in recent versions of Firefox and Internet Explorer, and provisionally supported in recent versions of Chrome and Safari. All Cayuse modules run entirely in a Web browser. Upon navigating to the Research Suite or an individual module for the first time, your browser may present a security warning, prompting you to accept a certificate. This is safe. Evisions purchases and maintains electronic certificates that are approved for Internet commerce and compliant with Internet security standards. Accept the certificate permanently, and you will proceed to the login screen. Here are the main configuration items for your browser: JavaScript Enabled Cookies Enabled Pop-ups Allowed In some browsers, cookies and pop-ups can be configured on a site-by-site basis. Detailed instructions for configuring these items can be found at the links below. If you're having any trouble accessing Cayuse 424 or the Research Suite, you may want to clear your cookies [1]. For detailed information on browser compatibility testing, see the Cayuse 424 Release Notes [2]. Chrome Settings Accepting Cookies 1. At the top right of Chrome, click the Customize button and select Settings. 2. Find and click Show advanced settings... 3. Find the section labeled Privacy, and click Content settings... 4. Under Cookies, if Allow local data to be set or Keep local data only until I quit my browser is selected, cookies are already being accepted, and no changes are needed.
    [Show full text]
  • Ÿþr E P O R T I N G a N D a N a L Y S I S R E a D M E
    ORACLE® HYPERION REPORTING AND ANALYSIS Release 11.1.2.2.000 Readme CONTENTS IN BRIEF Purpose ............................................................. 2 New Features in This Release .............................................. 2 New Features in Release 11.1.2.1.00 ......................................... 3 New Features in Release 11.1.2.0.00 ......................................... 6 Installation Information ................................................ 10 Supported Platforms ................................................... 10 Supported Languages .................................................. 10 Supported Paths to this Release ........................................... 11 Defects Fixed in this Release ............................................. 11 Known Issues ........................................................ 24 Documentation Updates ................................................ 42 Accessibility Considerations ............................................. 44 Purpose This document includes important, late-breaking information about this release of Oracle Hyperion Reporting and Analysis products. Review this Readme thoroughly before installing Reporting and Analysis products. New Features in This Release The following enhancements are included in this release. EPM Workspace l Bidirectional language support Financial Reporting l A new text function, LabeledCellText, retrieves the textual content from a Oracle Hyperion Financial Management database connection through the ADM driver. l Ability to change alias
    [Show full text]