摘要:
Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
摘要:
System and method for mapping a location of each of a plurality of devices in a data center. In one embodiment, the method comprises receiving image data comprising an image of at least a portion of the data center from a source; processing the image data to locate visual identifiers displayed in the image, wherein each of the visual identifiers is associated with one of the devices or with a spatial reference point; extracting the located visual identifiers and determining spatial coordinates for each of the identified visual identifiers from the image; and determining the spatial reference points from the image. The method further comprises developing groups based on extracted visual identifiers and spatial coordinates thereof and the spatial reference points, wherein allowances are made for an angle of the image, wherein each group comprises a subset of related ones of the devices; for each group, comparing each of the visual identifiers of the group with a key to determine information regarding the associated device to obtain processing results; and combining processing results corresponding to multiple images to remove redundant information and produce final results.
摘要:
Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
摘要:
System and method for implementing a wireless query and display interface are disclosed. In one embodiment, the system includes a machine to be monitored and an end-point associated with the machine and comprising an interface, the end-point for connecting to the machine to be monitored via the interface. The system further includes a consolidator comprising an identity service and a Global Device Identity Listing (“GDIL”), the GDIL for maintaining a list of machines to be monitored using the system and a wireless device for viewing the list maintained by the GDIL and for issuing commands and queries related to one or more of the machines on the list. The end-point, the consolidator, and the wireless device are capable of wirelessly communicating with one another.
摘要:
System and method for displaying an item on a display of a computer, wherein the item represents a file installed on the computer, are described. In one embodiment, the method comprises, responsive to a determination that a usage rate of the file exceeds a predetermined minimum rate, displaying the item representative of the file on the computer display; determining whether the usage rate of the file has changed; and responsive to a determination that the usage rate of the file has changed, updating at least one visual attribute of the item representative of the file to indicate the usage rate change.
摘要:
Techniques for workload discovery and organization are presented. A workload when initiated on a network self-inspects the network for other workloads processing as a collection over the network. Shared communication information is used by the workload to dynamically join the collection. A network address for the initiated workload is then added to a shared Domain Name System (DNS) database being maintained for the network and the collection.
摘要:
Techniques for identity authentication of Virtual Machines (VM's) are provided. A VM is authenticated and once authenticated, each device interfaced to or accessible to the VM is also authenticated. When both the VM and each device are authenticated, the VM is granted access to a machine for installation thereon.
摘要:
System and method for implementing a floating index navigation tool are described. In one embodiment, the method includes, in response to a user's updating a search term, building first and second search queries; issuing the first and second search queries to at least one database comprising a searchable index of content; and responsive to receipt of search results from the first and second search queries, displaying the first query search results in a first manner and displaying the second query search results in a second manner different than the first manner.
摘要:
Techniques for identity authentication of Virtual Machines (VM's) are provided. A VM is authenticated and once authenticated, each device interfaced to or accessible to the VM is also authenticated. When both the VM and each device are authenticated, the VM is granted access to a machine for installation thereon.
摘要:
System and method for implementing an adaptive wizard utility for a graphical user interface (“GUI”) are described. In one embodiment, the method comprises, responsive to presentation of a page of the wizard utility to a user, monitoring user activity in connection with the page; analyzing the user activity to determine a current performance designation of the user; and modifying at least one page of the wizard utility based on the current performance designation of the user.