摘要:
A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.
摘要:
A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.
摘要:
A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.
摘要:
A method of dynamically composing or updating electronic contact lists, such as mailing lists, on the basis of proximity to a particular point or user. By means of this method a user can be offered the option of addressing a method to all “nearby” users. Proximity may be determined with reference to network hardware or other resources associated with each user, for example, LAN segments or wireless access points.
摘要:
A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions.
摘要:
A method is presented for managing resource licensing. The method may include detecting an installed web server and/or application server to identify a container installation path, and identifying a resource associated with the container installation path. A resource installation path and a licensing structure may be determined for the resource. The method may further include building an application representation associating the resource installation path with the licensing structure, and determining the instances of resource use. The instances of resource use may be compared to the application representation to determine a licensing state for the resource.
摘要:
A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.
摘要:
A solution for distributing software products is proposed. Typically, a software distribution infrastructure controls the deployment of software packages to selected endpoints; each software package includes commands and resource images, which are used to install a corresponding software product. For this purpose, an e-mail service is exploited. Particularly, a new e-mail message is created for each software package to be deployed; the software package is embedded into the e-mail message as an attachment and tags for controlling the software distribution process (such as a desired target state of the software package) are inserted into its body section. A plug-in of a mail client on each endpoint receives that e-mail message; the software package is then extracted and passed to an application engine, which controls its application according to the target state indicated by the corresponding control tag.
摘要:
A method of dynamically composing or updating electronic contact lists, such as mailing lists, on the basis of proximity to a particular point or user. By means of this method a user can be offered the option of addressing a method to all “nearby” users. Proximity may be determined with reference to network hardware or other resources associated with each user, for example, LAN segments or wireless access points.
摘要:
Browsing the World Wide Web may expose a user's system to malicious attacks that can lead to data loss and/or system failure. Sometimes a user desires to access information on a web page that may contain malicious content. For example, a college student researching computer hacking may need information provided on a hacking website even though the site is potentially dangerous. Although techniques are employed to install potentially harmful executable files into a sandbox (e.g., virtual machine), these techniques do not address navigation of harmful sites. Functionality can be implemented to instantiate a web browser within a controlled virtual environment (“sandbox”) that simulates the host system while restricting the virtual environment to designated space(s) and/or resources of the host system to prevent harmful effects. Instantiating the web browser in the sandbox allows web navigation of risky web sites without deleterious effects on the host system.