摘要:
A programmed method for supplying content includes receiving via a network a request for a first content for use on a device, from a requester; automatically selecting a second content to fulfill the request; and providing the second content to a source of the request. From the point of view of a requester, the programmed method includes requesting via a network a first content for use on a device; and receiving an automatically selected second content to fulfill the request. The device may be a computer, and the content may be software for use on the computer. Selection may be performed in accordance with predetermined criteria, including predetermined rules. Information defining at least one criterion may be received from at least one requester. The criteria may be based on relatedness of the first content and the second content. Generally, the request is fulfilled via a network.
摘要:
A system automatically determines probable idle times for a computing system and performs maintenance tasks, such as virus scanning, during these times. A prediction of probable idle times is based on an assessment of a user's past use or by an aggregate of information from several users if a company wishes to determine optimal times for running such tasks or pushing software patches to employees. A policy table set by the user or a company determines the priority of maintenance tasks to be run during the predicted idle time.
摘要:
Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.
摘要:
A system and method for providing real-time, dynamic switching between first and second service providers each capable of providing a service for users over a communications network. The method includes steps of: establishing switching criterion for deciding when to switch service provision between the first service provider and second service provider; maintaining state information associated with a user's use of the service provided by a first service provider; switching between the first and second service provided over the communications network based on satisfaction of the switching criterion; and, migrating any state information maintained up to the time of switching to the second service. Preferably, the dynamic switching occurs in a manner substantially transparent to the user.
摘要:
A system, method and computer program product for monitoring availability of end user devices needed for performing tasks. The system comprises a first network including one or more devices associated with an end user, at least one device adapted for communicating with a service provider over a second network, the service provider providing network-based services in the system. The system includes a memory storage device for maintaining information of tasks associated with an end user, the information including recommended end-user devices adapted to perform the tasks, the information being accessible to at least one end-user device. At least one end-user device detects non-availability or performance deficiencies of any end-user device required in performing end-user tasks, and communicates with the service provider for invoking network-based services to facilitate correcting non-availability of any end-user device. Such a system, method and computer program product enables students to receive these reminders and alerts, to order the necessary upgrades from suppliers via web services, and to monitor delivery from a single user interface provided on one of their devices.
摘要:
A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.
摘要:
A method of transferring an image of a system or disk to a computer dedicated to performing a resource-intensive task, such as virus scanning, disk defragmentation or similar service. Once the dedicated computer has performed the task, the resulting image is compared to the current image of the client system or disk to produce an updated image. The client system or disk is then updated with the updated image.
摘要:
A system and method for implementing a customer incentive program that conditionally rewards a customer based upon the customer's movement through a shopping area and/or responses to questions which refer to the shopping area, sections of the shopping area and/or products located in the shopping area. While moving through a shopping area, a customer is monitored using a customer tracking system and/or presented with questions using a customer interface device. The customer is rewarded based upon the nature of the customer's movements and/or the nature of the customer's responses. The customer incentive program is designed to expose a customer to particular sections of a shopping area or specified products in the shopping area in order to motivate customer impulse buying.
摘要:
The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.
摘要:
A computer system having at least one CPU has as its only interface with the Internet and other external sources a virtual machine that contains a browser and/or other communications programs, so that e-mail and other external communications are opened within the virtual machine and stored within a virtual storage. The virtual machine is erased at frequent intervals, taking with it any changes made by virus or other hostile programs.