Computing devices have made significant contributions toward the advancement of modern society and are utilized in a number of applications to achieve advantageous results. Computing devices have facilitated increased productivity and reduced costs in communicating and analyzing data in most areas of entertainment, education, business, and science. The amount of information accessible through computing devices continues to increase. There are a number of techniques for locating information depending upon where the data is located. Generally, search engines are information retrieval systems used to locate content, information, data and the like on computing systems. Internet search engines enable searching of publicly accessible information on the World Wide Web, but not application data that is private to a user. Desktop search engines enable searching the local system for user specific information.
Referring now to
In addition to content and application that run locally on a user computing device, there are a growing number of rich internet applications. The rich internet applications are applications with features and functionality similar to desktop applications. At least a portion of each rich internet application runs locally in a secure environment (e.g., sandbox) and a portion may also run on a server. The content and application data of a rich internet application is stored in a private storage area of the rich internet application and is not generally available outside the rich internet application. Therefore, the content of rich internet applications and application data is not readily searchable by the desktop search engine. Accordingly, there is a need for search techniques that provide for searching the content of rich internet applications.
Embodiments of the present technology are directed toward search techniques for rich internet applications. In one embodiment a method for enabling searching rich internet applications includes publishing a subset of private rich internet application data to a corresponding per-rich internet application public storage area for each of one or more rich internet applications, and a relative link to one or more given items of the subset in the private rich internet application data. The method also includes generating a search index of data stored in the per-rich internet application public storage area. The method may also include receiving a search request, querying the search index based on the search request, and outputting a search result of the query. The method may further include receiving a selection of a given item of the search result, starting a given rich internet application based on the selected given item, and passing the relative link for the given item to the rich internet application. In response thereto, the rich internet application converts the relative link to a qualified link and outputs content at the given item through the rich internet application.
In another embodiment, one or more computing device readable media including instructions which when executed cause a computing system to implement a method that includes publishing a subset of data and relative link thereto in a public rich internet application storage and notifying a search engine of the publication of the subset of data and relative links. In response thereto, the search engine analyzes the subset of data published to each per-rich internet application public storage to build an encoded index based on a system of weighting and stores the encoded index in a search index.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Embodiments of the present technology are illustrated by way of example and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
Reference will now be made in detail to the embodiments of the present technology, examples of which are illustrated in the accompanying drawings. While the present technology will be described in conjunction with these embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the scope of the invention as defined by the appended claims. Furthermore, in the following detailed description of the present technology, numerous specific details are set forth in order to provide a thorough understanding of the present technology. However, it is understood that the present technology may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present technology.
Referring now to
The I/O devices 335-350 include a network adapter (e.g., Ethernet card) 335 for communicating with one or more server computers over one or more networks. The I/O devices 335-350 also include a CD drive, DVD drive and/or the like, and peripherals such as a keyboard 340, a pointing device 345, a speaker, a printer, and/or the like.
The computing device-readable media 320-330 may be characterized as primary memory and secondary memory. Generally, the secondary memory, such as a magnetic and/or optical storage, provides for non-volatile storage of computer-readable instructions and data for use by the computing device 200. For instance, the disk drive 325 may store the operating system (OS) 360, desktop applications and data 365, and one or more rich internet applications (e.g., client engines) and data 370. The primary memory, such as the system memory 320 and/or graphics memory 330, provides for volatile storage of computer-readable instructions and data for use by the computing device 200. For instance, the system memory 320 may temporarily store a portion of the operating system 360′, a portion of one or more applications and associated data 365′ and a portion of one or more rich internet application and associated data 370′ that are currently used by the CPU 310, GPU 315 and the like.
Referring now to
A subset of each rich internet application's data, personal to a user, is made available to a respective per-RIA public data storage 415, 425, 435 so that it can be integrated with the rest of the local user data. The subset of each rich internet application's data is made available outside of the rich internet application in the sense that it is available to other applications or systems like the local search engine 450-470. The public data storage areas 415, 425, 435 for the respective rich internet applications enable each application to integrate a subset of its private application data into the local machine for an integrated user experience. The public rich internet application data can be used in platform experiences, like desktop search, or application experience for manipulation by other applications, such as a spreadsheet application.
Referring now to
Operation of the computing environment shown in
In one implementation, the developer of a rich internet application chooses which data items to publish into the RIA public data storage area 415, 425, 435, as search items. For the search items the developer may provide a title, one or more keywords, an optional FormName, and a safe relative navigation uniform resource locator (e.g., ID=25) within the rich internet application. For example, the following pseudo code illustrates publishing of exemplary search item data:
In addition to manually publishing data items for search indexing, the rich internet application developer can automatically publish items from the rich internet application data model. The developer may define the rich internet application data model using classes to describe the data entities and relationships between them. For example a purchasing rich internet application may have Order and a collection of OrderLine that work together to represent a complete purchase order. The private data mode is stored in per-rich internet application private storage. The private data model may be specified for example by the following pseudo code:
The developer may enable searching of the rich internet application's object data model by identifying and marking the items in the object data model (views into the data model) that are search items and the parts of search metadata such as search title, search keyword, etc. The developer may use custom attributes on the class members to mark the items. When the data model is loaded into the rich internet application by the data system, the data system works with the rich internet application search integrator to automatically publish the marked data items to the search index. For example, the following pseudo code illustrates:
wherein, the SearchItem identifies that the item from the object data model should be included in the search index. SearchIdentifier is a unique identifier for the item for the search index to enable tracking and provides to the application the ability to navigate back to the item when the user clicks on a search result. SearchTitle is the tile of the item to display in the search results. SearchKeywordSource are keywords from the item that will be included in the search index to enable users to search the index to find search results.
At 615, the search crawler 450, sometimes also referred to as a spider, analyzes the subset of data published to the public RIA storage 415, 425, 435 of each rich internet application to build an index of the data. The analysis generally builds list of words found in the files on the public RIA storage 415, 425, 435 and the metadata for those files and where the words were found. The search crawler 450 builds an index based on a system of weighting (e.g., ranking) The weighting, for example, might assign a weight to each entry with increasing values assigned to words as they appear near the top of a document, in sub-headings, in links, in the meta tags or in the title of the page. The index may be encoded to reduce the storage requirements and/or time to search the index. The search crawler 450 may also index the local storage 140 of the desktop applications 110-130, as illustrated in
The encoded index is then stored in a search index 460, at 620. If the search crawler 450 indexes items in the local storage 140, the indexed items from the local storage 140 may be combined with the indexed items from the per RIA public storages 415, 425, 435, in a single search index or a separate search index may be maintained for items in the local storage 140. The processes of 605-620 may be performed periodically, in response to a change of the data in a private RIA storage area 510, or in response to receipt of a search request just before the search index is queried.
At 625, the query routine 470 receives a search request. The search request may be a simple text search, literal search, concept-based search, advanced query search, natural query search or the like. In one implementation, the query routine 470 provides a graphical user interface including a text field to enter the search request. The query routine 470 examines the search index 460 and determines the one or more applicable search results, at 630. The search results include a listing of best-matching data according to a specified criteria. At 635, the query routine outputs the search results. The search results may include, but is not limited to, the name of the item (e.g., file), the name of the rich internet application, date/time created, date/time modified, item size, item type, a summary of the item and/or the like for each item in the per RIA public storages that matches the search request as determined from the search index. The search results may also include the name of the item (e.g., file name), path, the name of the application, date/time created, date/time modified, item size, item type, a summary of the item and/or the like for each time in the local storage 140 that matches the search request as determined from the search index.
At 640, selection of a given item in the search result is received. In one implementation, the user may select the given item in the search results displayed in the graphical user interface using a pointing device, a keyboard or the like. At 645, the query routine 470 starts a given rich internet application that the selected item is associated with and passes a relative link for the given search result item to the rich internet application. The user may also or alternatively specify a given application to start that can access the selected item in the private RIA storage.
At 650, the rich internet application receives the relative link. At 655, the relative link is converted to a qualified link to the selected item in the search result in the private RIA storage. In one instance, the developer can provide code in the RIA host 520 to process a relative navigation uniform resource locator (URL) to enable deep navigation to the corresponding fully qualified uniform resource locator (URL) when the rich internet application starts. The code in the RIA host 520 can process the relative navigation uniform resource locator and query string when the rich internet application starts. For example, the following pseudo code illustrates navigation upon startup of the rich internet application based on the relative navigation uniform resource locator:
The RIA application programming interface interacts with the RIA host to safely expand the relative URL to a full navigation URL. Thus the rich internet application developer provides a navigation entry point to enable automatic deep linking Thereafter, when the user searches for an item in the search index and clicks on a search result, the search systems will work with the RIA host to launch the rich internet application and navigate into the application with specific data (e.g., to a particular purchase order) For example, the following pseudo code illustrates deep linking:
At 660, the content at the qualified link in the private storage of the rich internet application is output through the rich internet application. The data may be output within the rich internet application or may be output for use by another application.
Referring now to
The search results may be aggregated 740 based upon one or more parameters such as the file type, storage location, date created/modified, or the like. For example, when the user searches from within a rich internet application they will see an aggregate set of results including published data items from the current rich internet application, search results from their local data, published data items from other local rich internet application, and optionally from their enterprise search engine and/or internet search engines
Accordingly, embodiments of the present technology advantageously publish specified data items to a per-rich internet application data storage areas. The data items may be automatically published for search indexing from a specified application data model. The systems search engine may therefore search data items of rich internet applications. In addition, users may deeply link from search results to the selected data item in the given rich internet application.
The foregoing descriptions of specific embodiments of the present technology have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, to thereby enable others skilled in the art to best utilize the present technology and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.
This application is a continuation of U.S. patent application Ser. No. 12/145,522, filed Jun. 25, 2008, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6278992 | Curtis et al. | Aug 2001 | B1 |
7296025 | Kung et al. | Nov 2007 | B2 |
7505978 | Bodin et al. | Mar 2009 | B2 |
7698316 | Song et al. | Apr 2010 | B2 |
7703040 | Cutrell et al. | Apr 2010 | B2 |
7707152 | Greenfield et al. | Apr 2010 | B1 |
20010056371 | Shuster | Dec 2001 | A1 |
20040128616 | Kraft | Jul 2004 | A1 |
20050097089 | Nielsen et al. | May 2005 | A1 |
20050198612 | Gonzalez | Sep 2005 | A1 |
20060184540 | Kung et al. | Aug 2006 | A1 |
20060235873 | Thomas | Oct 2006 | A1 |
20070038665 | Kwak et al. | Feb 2007 | A1 |
20070043704 | Raub et al. | Feb 2007 | A1 |
20070088686 | Hurst-Hiller et al. | Apr 2007 | A1 |
20070094042 | Ramer et al. | Apr 2007 | A1 |
20070112757 | Bates et al. | May 2007 | A1 |
20070118609 | Mullan et al. | May 2007 | A1 |
20070175674 | Brinson et al. | Aug 2007 | A1 |
20070226242 | Wang et al. | Sep 2007 | A1 |
20070271247 | Best et al. | Nov 2007 | A1 |
20080005079 | Flake et al. | Jan 2008 | A1 |
20080071742 | Yang et al. | Mar 2008 | A1 |
20080082513 | Oral et al. | Apr 2008 | A1 |
20080147641 | Leffingwell et al. | Jun 2008 | A1 |
20080147655 | Sinha et al. | Jun 2008 | A1 |
20080229231 | Delia et al. | Sep 2008 | A1 |
20090063421 | Burson et al. | Mar 2009 | A1 |
20090063448 | DePue et al. | Mar 2009 | A1 |
20090248619 | Das et al. | Oct 2009 | A1 |
20090265367 | Corbett | Oct 2009 | A1 |
20090327261 | Hawkins | Dec 2009 | A1 |
20090327270 | Teevan et al. | Dec 2009 | A1 |
20100205208 | Walker | Aug 2010 | A1 |
20110066951 | Ward-Karet et al. | Mar 2011 | A1 |
20110093434 | Arora et al. | Apr 2011 | A1 |
Number | Date | Country |
---|---|---|
2005066842 | Jul 2005 | WO |
Entry |
---|
International Search Report and Written Opinion, Mailed Date: Apr. 5, 2013, Application No. PCT/US2012/069979, Filed date: Dec. 17, 2012, pp. 10. |
“Welcome to Google Enterprise”, Retrieved at <<http://www.google.com/enterprise/enterprise—solutions/education.html, Retrieved Date: Oct. 19, 2011, pp. 2. |
Carughi, Giovanni Toffetti, “Modelling data-intensive Rich Internet Applications with server push support”, conf/icwe/2007mdwe, vol. 261, Year 2007, pp. 15. |
Duhl, Joshua, “Rich Internet Applications”, Nov. 2003, pp. 33. |
Heller, David, “RIAs: The Technology is Exciting, but They Really Do Help Users”, Retrieved at <<http://www.uxmatters.com/MT/archives/000041.php>>, Dec. 6, 2005, pp. 13. |
“The revolution for interacting with the Web”, Retrieved at <<http://www.softguide.com/pj/2836/flex.htm>> on Apr. 17, 2008, pp. 3. |
“Google Desktop”, Retrieved at <<http://desktop.google.com/features.html#additional>> on Apr. 18, 2008, pp. 3. |
Ghanem et al. “Databases Deepen the Web”, Computer. vol. 37, Issue 1, Jan. 2004. pp. 116-117. |
Number | Date | Country | |
---|---|---|---|
20130297585 A1 | Nov 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12145522 | Jun 2008 | US |
Child | 13937968 | US |