Abstract:
A managed network with a quarantine enforcement policy based on the status of installed updates for software on each client seeking access to the managed network. To determine whether a client requesting access has up-to-date software, an access server may communicate directly with an update server to determine the update status of the client requesting access. Information from the update server allows the update server to determine which update the client requesting access is missing. The access server may also receive an indication of the severity of the updates missing from the client requesting access. The access server may use the severity information to apply a quarantine enforcement policy, thereby avoiding the need for either the client or access server to be programmed to identify specific software updates that must be installed for a client to comply with a quarantine enforcement policy. To reduce network congestion and delays seeking access to the network, the quarantine enforcement policy includes a deadline by which updates must be installed. Establishing a deadline allows a grace period during which clients may download new updates and avoids network congestion from multiple clients downloading updates simultaneously.
Abstract:
Various embodiments pertain to techniques for forecasting and providing guaranteed delivery of ad impression opportunities using real-time bidded platform inventories. In various embodiments, bid landscape data, such as information regarding a number of impression requests by a particular supply unit, a time of the impression requests, and an amount of a winning bid for the impression requests, is recorded for use in forecasting an available impression volume as a function of cost. The forecasted available impression volume represents a number of ad impression requests likely to be obtained through real-time bidding channels. In various embodiments, an advertiser can place an order for a number of ad impressions at a particular price, and the ad impressions ordered can be specifically allocated for that advertiser. The number of ad impressions ordered by an advertiser that are guaranteed vary depending on the price and the available volume forecasted at that price.
Abstract:
Systems and method can be provided for selecting advertising payloads for display in an available advertising impression location. The advertising payloads can be selected based on an auction between various types of hosted and third party campaigns, including hosted reserved advertising campaigns and hosted non-reserved advertising campaigns. The rules of the auction can be set and/or updated over time to allow hosted campaigns to meet desired goals, such as delivering a minimum number of impressions or spending an expect budget amount.
Abstract:
Described is a technology for managing network security by having network clients that are capable of self-assessment assess themselves for security risks and/or security vulnerabilities. Other clients may be remotely assessed for security risks and/or security vulnerabilities. Assessments may include antimalware scans, vulnerability assessment, and/or port scans. The results of the self-assessments and remote assessments are combined into a data set (e.g., a view) indicative of the network security state. In this manner, for example, significant network resources are conserved by allowing those clients capable of self-assessment to assess themselves and thereafter only provide their self-assessment results. Clients capable of self-assessment may also be remotely assessed, to determine whether any discrepancies exist between their remote assessments and self-assessments. Clients may be discovered, along with their self-assessment capabilities, by network communication.
Abstract:
Described is a technology for managing network security by having network clients that are capable of self-assessment assess themselves for security risks and/or security vulnerabilities. Other clients may be remotely assessed for security risks and/or security vulnerabilities. Assessments may include antimalware scans, vulnerability assessment, and/or port scans. The results of the self-assessments and remote assessments are combined into a data set (e.g., a view) indicative of the network security state. In this manner, for example, significant network resources are conserved by allowing those clients capable of self-assessment to assess themselves and thereafter only provide their self-assessment results. Clients capable of self-assessment may also be remotely assessed, to determine whether any discrepancies exist between their remote assessments and self-assessments. Clients may be discovered, along with their self-assessment capabilities, by network communication.