Design Studio User Guide Release 2.1 (Service Pack)
Total Page:16
File Type:pdf, Size:1020Kb
Design Studio User Guide Release 2.1 (Service Pack) 16-300271 Issue 2.1 April 2006 Copyright 2004-2006, Avaya Inc. Such intrusions may be either to/through synchronous (time- All Rights Reserved multiplexed and/or circuit-based) or asynchronous (character-, message-, or packet-based) equipment or interfaces for reasons of: Notice • Utilization (of capabilities special to the accessed equipment) Every effort was made to ensure that the information in this document • Theft (such as, of intellectual property, financial assets, or toll was complete and accurate at the time of printing. However, facility access) information is subject to change. • Eavesdropping (privacy invasions to humans) Warranty • Mischief (troubling, but apparently innocuous, tampering) • Harm (such as harmful tampering, data loss or alteration, Avaya Inc. provides a limited warranty on this product. Refer to your regardless of motive or intent) sales agreement to establish the terms of the limited warranty. In Be aware that there may be a risk of unauthorized intrusions addition, Avaya’s standard warranty language as well as information associated with your system and/or its networked equipment. Also regarding support for this product, while under warranty, is available through the following Web site: http://www.avaya.com/support. realize that, if such an intrusion should occur, it could result in a variety of losses to your company (including but not limited to, Trademarks human/data privacy, intellectual property, material assets, financial DEFINITY is a registered trademark of Avaya, Inc. MultiVantage is a resources, labor costs, and/or legal costs). trademark of Avaya, Inc. Windows, Windows 2000, and Windows NT Responsibility for Your Company’s Telecommunications Security are trademarks or registered trademarks of Microsoft Corporation. The final responsibility for securing both this system and its Preventing Toll Fraud networked equipment rests with you - Avaya’s customer system administrator, your telecommunications peers, and your managers. “Toll fraud” is the unauthorized use of your telecommunications system by an unauthorized party (for example, a person who is not a Base the fulfillment of your responsibility on acquired knowledge and resources from a variety of sources including but not limited to: corporate employee, agent, subcontractor, or is not working on your company's behalf). Be aware that there may be a risk of toll fraud • Installation documents associated with your system and that, if toll fraud occurs, it can result • System administration documents in substantial additional charges for your telecommunications • Security documents services. • Hardware-/software-based security tools • Shared information between you and your peers Avaya Fraud Intervention • Telecommunications security experts If you suspect that you are being victimized by toll fraud and you need To prevent intrusions to your telecommunications equipment, you and technical assistance or support, in the United States and Canada, call your peers should carefully program and configure: the Technical Service Center's Toll Fraud Intervention Hotline at • Your Avaya-provided telecommunications systems and their 1-800-643-2353. interfaces Disclaimer • Your Avaya-provided software applications, as well as their underlying hardware/software platforms and interfaces Avaya is not responsible for any modifications, additions or deletions • Any other equipment networked to your Avaya products to the original published version of this documentation unless such modifications, additions or deletions were performed by Avaya. TCP/IP Facilities Customer and/or End User agree to indemnify and hold harmless Customers may experience differences in product performance, Avaya, Avaya's agents, servants and employees against all claims, reliability and security depending upon network configurations/design lawsuits, demands and judgments arising out of, or in connection with, and topologies, even when the product performs as warranted. subsequent modifications, additions or deletions to this documentation to the extent made by the Customer or End User. Standards Compliance How to Get Help Avaya Inc. is not responsible for any radio or television interference caused by unauthorized modifications of this equipment or the For additional support telephone numbers, go to the Avaya support substitution or attachment of connecting cables and equipment other Web site: http://www.avaya.com/support. If you are: than those specified by Avaya Inc. The correction of interference • Within the United States, click the Escalation Management link. caused by such unauthorized modifications, substitution or attachment Then click the appropriate link for the type of support you need. will be the responsibility of the user. Pursuant to Part 15 of the Federal • Outside the United States, click the Escalation Management link. Communications Commission (FCC) Rules, the user is cautioned that Then click the International Services link that includes telephone changes or modifications not expressly approved by Avaya Inc. could numbers for the international Centers of Excellence. void the user’s authority to operate this equipment. Providing Telecommunications Security To order copies of this and other documents: Telecommunications security (of voice, data, and/or video Call: Avaya Publications Center communications) is the prevention of any type of intrusion to (that is, Voice 1.800.457.1235 or 1.207.866.6701 either unauthorized or malicious access to or use of) your company's FAX 1.800.457.1764 or 1.207.626.7269 telecommunications equipment by some party. Write: Globalware Solutions Your company's “telecommunications equipment” includes both this 200 Ward Hill Avenue Avaya product and any other voice/data/video equipment that could be Haverhill, MA 01835 USA accessed via this Avaya product (that is, “networked equipment”). Attention: Avaya Account Management An “outside party” is anyone who is not a corporate employee, agent, E-mail: [email protected] subcontractor, or is not working on your company's behalf. Whereas, a For the most current versions of documentation, go to the Avaya “malicious party” is anyone (including someone who may be support Web site: http://www.avaya.com/support otherwise authorized) who accesses your telecommunications equipment with either malicious or mischievous intent. Contents Preface ix Audience ix Organization ix Conventions x Related Documentation xi CHAPTER 1 Overview 1 Introduction 1 Design Studio Features 3 Understanding How the Application Gateway Works 5 Supported Formats 8 Understanding Microbrowser Limitations 11 CHAPTER 2 Design Studio Administration 13 Starting Design Studio 13 Changing your Password 14 Connecting to a Different Application Gateway 14 Configuring Device Definitions 15 Changing a Device Definition 22 Adding a Device Definition 23 Importing Device Definitions 26 Installing the Openwave Mobile Browser Simulator 26 Installing the Go.Web Simulator 28 CHAPTER 3 Design Studio Basics 31 Design Studio Concepts 31 Transformation Rules 31 Configuration and Project Files 32 XHTML Element Hierarchy 33 Design Studio User Guide iii Contents Navigating the Design Studio Window 35 Using the Project Tree 36 Viewing Page and Rule Information 37 Using the View Tabs 38 Finding Commands 39 Finding Text in the XHTML Source View 39 Design Studio Workflow 40 Working with Configuration Files and Projects 41 Creating a Configuration File and HTML Project 41 Opening and Saving a Configuration File 43 Adding an HTML Project to a Configuration File 44 Deleting a Project 44 Adding a Page to an HTML Project 45 Handling Page Redirects 46 Renaming a Page 47 Displaying Page Information 47 Deleting a Page 48 CHAPTER 4 Transformation Basics 49 Identifying a Page 49 Identifying a Page by Element Text 51 Identifying a Page by URL 54 Using an Identifier Rule for Multiple Pages 56 Creating Transformation Rules 58 Editing Transformation Rules 65 Copying Rules from One Device to Another 66 Performing Basic Transformations 67 Selecting Content 67 Clipping Content 71 Ignoring Content 74 Modifying Content 77 Inserting Content 82 Well-Formed XML 86 Moving an Element Tag 87 iv Design Studio User Guide Contents Working with Conflicting or Dead Rules 90 Resolving Conflicting Rules 90 Evaluating Dead Rules 92 Applying Rules to Several Elements 93 Introduction 93 Applying Rules Based on Element Name or Text 96 Applying Rules Based on Depth 101 Applying Rules Based on Position 102 How the Depth and Position Settings Interact 104 Example: Applying Rules to Elements that Change Positions 105 Example: Applying a Rule to a Range of Positions 106 Example: Applying a Rule to Several Nested Tables 107 Example: Clipping Links to Binary Data Files Across a Project 108 Using a Relative Path to Specify a Rule Location 109 Applying Rules Based on Element Attribute Values 111 Example: Applying a Rule to All Occurrences of an Element with a Specified Attribute 112 Applying the Move Rule to Several Elements 112 CHAPTER 5 Working with Pages and Elements 115 Working with Pages 115 Transforming Template-Based Pages 116 Transforming Pages Using a Default Set of Transformation Rules 117 Dividing a Web Page into Several Pages 118 Transforming Query and Results Pages 124 Working with Dynamically Generated Pages 127 Specifying a Rule Location on a Dynamically Generated Page 128 Example: Applying Rules to Dynamically Generated Content 129 Working with Frames and Windows 131 Guidelines for Transforming Frames and Window Content