A method of facilitating computing-environment control of a resource to be accessed by existing program code is provided which includes;
transparently replacing an uncontrolled resource referenced by existing program code with a resource controlled by a computing environment;
transparently interposing at least one resource management service of the computing environment between the existing program code and the resource controlled by the computing environment, wherein the at least one resource management service provides computing-environment control of the resource to be accessed by the existing program code. The replacing of the uncontrolled resource prevents the existing program code from directly accessing the resource.
Populating an XML index is parallelized, providing both inter-document and intra-document parallelism, by using multiple pull-type parser processes to parse respective XML documents in parallel and to call respective ‘instances’ of the function that generates the index entries based on parsed XML node information.
The function is configured to operate according to a cursor-type interface model, whereby
each function instance can operate on one node at a time in a controlled pull manner rather than in an uncontrolled streaming manner.
Hence, the index load procedure flow can be in the control of an application or routine, via the pull parsers, rather than in the control of a serial stream-based parser.
In some embodiments, communications in a private network are programmatically inspected to identify traffic associated with uncontrolled Web applications originating from outside of the private network.
Unstructured data, including messages and application content, originating from such uncontrolled Web Applications may be disassembled, analyzed, and categorized into source specific application element types (AETs).
A monitoring layer may be injected on a page associated with the uncontrolled Web Application to allow a user to switch between different modes. Activities associated with different modes may be handled differently utilizing AETs. Example modes may include personal, professional, etc.
The monitoring layer provides an entity operating a private network with the ability to distinguish different types of user activities associated with accessing uncontrolled Web applications, allowing the entity to isolate those activities and contents that should be monitored and process them according to internal policies and/or business rules.