摘要:
A method of transferring an image of a system or disk to a computer dedicated to performing a resource-intensive task, such as virus scanning, disk defragmentation or similar service. Once the dedicated computer has performed the task, the resulting image is compared to the current image of the client system or disk to produce an updated image. The client system or disk is then updated with the updated image.
摘要:
The present invention provides techniques for protecting information in a computing device. For instance, a location of the computing device is detected. It is determined whether the location is an unauthorized location. Access to the information is restricted in response to the location being an unauthorized location. As another example, information in a computing device may be protected by detecting location of the computing device. It is determined whether the location is an unauthorized location. One or more decoy files are created in the information in response to the location being an unauthorized location.
摘要:
A computer system having at least one CPU has as its only interface with the Internet and other external sources a virtual machine that contains a browser and/or other communications programs, so that e-mail and other external communications are opened within the virtual machine and stored within a virtual storage. The virtual machine is erased at frequent intervals, taking with it any changes made by virus or other hostile programs.
摘要:
A virtual device hub, into which local devices are plugged, enables those devices to be virtualized locally and with a remote virtual machine. Those devices then appear as available to the remote application, and can be used, for example, to print a report being processed on the remote host to a printer located at the user's physical location. The user's virtual device hub is a small computer device with network capability that is able to access the remote virtual machine. When the user runs an application, the application is actually being run in the remote virtual machine.
摘要:
A subscriber to a service that monitors user behavior first registers with that service and selects a model of user behavior. The service then transmits that model to an agent, situated capable of monitoring user behavior and relating it to the model. After the monitoring interval the agent transmits data from the model to a server, where that data is summarized and reports created. These reports can then be sent to the subscriber in satisfaction of their needs for behavioral information.
摘要:
A computer system having a backup function keeps only one copy of the operating system and application images on the server, and reconfigures them automatically upon reinstallation. The installation of the system is recorded, along with user settings, and a script file built that is used for input to the recovery or new system creation process.
摘要:
The present invention introduces the notion of a route provider that efficiently and automatically helps and rewards drivers for traversing optimal driving routes. In particular, described is a technique for receiving one or more conditions and criteria associated with map directions over a computer network from a service bureau. The route provider or a third party may reward drivers for traversing preferred routes.
摘要:
The present invention provides methods, apparatus and systems for a coupon service facilitated by a coupon service bureau that manages the easy creation and exchange of targeted coupons created by users (150, 160) and other coupon associates. Moreover, immediate coupon information may be provided at the store using coupon devices that notify users (140, 170) about product information and the best discounts that are available at the current store or further advantages available at other stores (110).
摘要:
A method is disclosed for operating a digital data processing system, as is a digital data processing system that operates in accordance with the method. The method includes steps of (A) detecting an activation of a user input that indicates that the system or a program executed by the system has become non-responsive to the user; (B) in response to detecting the activation of the user input, transferring to a data storage business entity, through a data communications network, selected user information; and (C) operating the data storage business entity so as to store the transferred user information, and to subsequently retrieve and transfer back to the digital data processing system at least some of the stored user information. Also disclosed is a data storage business entity having a data communications network interface for coupling the data storage business entity to client data processing systems and a controller that is responsive to an arrival of information from a client data processing system for storing the information and for subsequently retrieving and transferring at least some of the retrieved information back to the client data processing system. The controller further operates to charge the client data processing system for at least one of storing the user information, retrieving the stored information, or for being available to store and retrieve the user information.
摘要:
The present invention concerns methods and apparatus that categorize states of computer systems selected to receive state-dependent maintenance activities as a prelude to the performance of those maintenance activities. In methods and apparatus of the present invention, it is determined, for example, that a certain version of an application program operating in computer systems having a specific operating system will be updated. A signature corresponding to the combination of the application program and operating system is incorporated in a software agent. The software agent is designed to poll computer systems in order to identify targets drawn from a population of computer systems that have states corresponding to the signature incorporated in the software agent. All computer systems having states that correspond to the signature then have the state-dependent computer maintenance activity performed on them.