摘要:
A mechanism is provided for configuring different computers of a network. Each computer plays a specific physic role (defined by an architecture of the network) and/or a specific logic role (defined by the applications running in the network). A reference model and a transition table are associated with each product to be installed in the network; the reference model specifies a target configuration for each role (defined by the components of the product to be installed), while the transition table specifies the actions required to reach each target configuration from each current configuration of the computers. A server identifies the role and the current configuration of each computer; the actions required to enforce the desired target configuration on the computer are then established and executed.
摘要:
A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.
摘要:
A method of managing configuration changes in a data processing system, particularly a network wherein software products (250) must be distributed to client workstations. The method provides the definition of reference models (220e-220d) arranged in a tree (215); each reference model includes configuration elements (such as software products and/or hardware features and their desired target status) for the corresponding client workstations (subscribers). A target configuration (230) of the client workstations associated with each reference model is determined by inheriting the configuration elements of the parent reference models. A list of actions (245) to be carried out on each client workstation for reaching the corresponding target configuration is determined by comparing the target configuration with a current configuration of the client workstation stored in a corresponding inventory (245).
摘要:
A solution (200) for collecting inventory information relating to complex resources is proposed. For this purpose, a data mover (285) interfaces with a common collector engine (210). The data mover registers (A3) itself as a listener for a selected resource class on behalf of every exploiter (265). The collector engine solves (A4) the correlations involving the selected resource class, as indicated in predefined discovery directories (235). Providers (225) adapted to discover inventory information about the correlated resource classes are periodically invoked (A5-A9), according to a scheduling plan defined in the same discovery directives. As soon as the providers for all the correlated resource classes have completed the discovery of the corresponding information (A10), the data mover is notified accordingly (A11). In response thereto, the data mover transfers (A13-A15) the discovered (delta) inventory information to the exploiter.
摘要翻译:提出了一种用于收集与复杂资源有关的库存信息的解决方案(200)。 为此目的,数据移动器(285)与公共收集器引擎(210)接口。 数据移动器(A 3)本身作为代表每个剥削者(265)的所选资源类的监听器。 收集器引擎解决(A 4)涉及所选资源类别的相关性,如预定义的发现目录(235)中所示。 根据相同发现指令中定义的调度计划,定期调用适于发现有关资源类别的库存信息的提供商(225)(A 5 -A 9)。 一旦所有相关资源类的提供者完成相应信息的发现(A 10),相应地通知数据移动者(A 11)。 响应于此,数据移动者将所发现的(delta)清单信息(A 13 -A 15)传送给剥削者。
摘要:
A method for transmitting information (from a source computer to one or more target computers) is proposed. The solution of the invention applies to a message (300o) that includes a main body (310) with possible attachments (315), each one identified by a corresponding internal link (320i) The attachments including bulk data are removed and placed onto a location (125s) of a distribution service wherein they are available for downloading; at the same time, the internal links of the removed attachments are replaced with external links (320e), which point to the corresponding downloading locations. The resulting compacted message (300c) is transmitted to each target computer directly. The target computer downloads the desired removed attachments (from the locations pointed by the corresponding external links); the message can then be reconstructed by restoring the downloaded attachments.
摘要:
A software distribution method (300) and a corresponding system are proposed. In the solution of the invention, each software package (which is used to deploy a desired software product) includes the definition of installation actions and configuration actions; the installation actions are used to load the software product (including its initial configuration), whereas the configuration actions are used to set configuration options of the software product after the installation. The software package can be applied (316-332;346) on each endpoint specifying an installation activity or a configuration activity (involving the execution of the corresponding actions). In this way, it is possible to reconfigure (346) a software product that is already available without its reinstallation; moreover, it is possible to correct (374) configuration errors directly on the endpoint.
摘要:
A method, system and computer program product for administering a secure data repository. Rather than using a specific database, an application may use an existing hierarchical file structure, such as provided by conventional operating systems, to store structured data in a number of files. To detect unauthorized, malicious or inadvertent changes to these files, either within one or more files, or by deletion, replacement or movement of files in their entirety, each file incorporates a last change timestamp and the contents of the file are digitally signed. Furthermore, every file in the secure repository is logged in an index file together with its respective change date stamp, and the index file as a whole is also digitally signed. Unauthorized changes can be identified by comparison of the file date stamps with the content of the index as well as verifying the validity of each digital signature.
摘要:
A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.
摘要:
Localizing a software product is improved. A plurality of attributes of a plurality of interface elements according to a specified type of user interface are retrieved. Responsive to user input, one or more countries in which the software product is to be localized are specified. An interface element for the user interface is selected. From the attributes of the selected interface element, it is determined whether the interface element is consistent with the specified countries. If not, an alert on a computer display is displayed, in the event the selected interface element is not consistent with the countries specified by the user. The invention also calculates a cost of localizing the selected interface element, wherein the projected cost of localizing the user interface is incremented with the cost of localizing the selected interface element. An alert for the projected cost of localizing the user interface is displayed on the computer display.
摘要:
A mechanism is provided for managing pre-requisite software components of a software product distributed on a virtual machine. A list of pre-requisite software components for the software product provided in the software product virtual image distribution package of the software product virtual image is read. A test is performed as to whether each pre-requisite software component in the list of prerequisite software components is not installed in the virtual machine. If the prerequisite software component is not installed, the pre-requisite software component is retrieved. License text of the retrieved pre-requisite software component is read and displayed to a user. Upon approval of the license text by the user, the retrieved pre-requisite software component is installed. The process is repeated until all the pre-requisite software components are installed.