摘要:
Apparatus and methods are disclosed for performing computer system management on an activity basis. In one embodiment, computer-system-related items are associated with at least one activity to be performed using the computer system. Then, management procedures are established for the at least one activity. Next, when the computer system is used to perform the at least one activity, the computer-system-related items associated with the at least one activity are managed in accordance with the management procedures established for the at least one activity. In another embodiment, apparatus and methods monitor patterns of use of a computer system. Using information gathered during monitoring operations, activity models are formulated, and for each activity model a management plan is devised. After management plans have been devised for each activity model, the use of the computer system is monitored to identify actions being performed with the computer system. The identified actions are then compared with the activity models to determine which activity model best fits the identified actions. Management of computer-system-related items associated with the activity is then performed using the management plan associated with the activity model that best fits the actions being performed with the computer system.
摘要:
A non-transitory computer-readable medium storing a program of instructions executable by a digital processing apparatus of a computer system to perform operations concerning at least two virtual machines operative in the computer system, the operations comprising: detecting computer system resources associated with each of the at least two virtual machines; displaying an interactive, integrated graphical user interface (GUI) on a display device associated with the computer system, whereby the GUI simultaneously displays graphical elements representing the detected computer system resources associated with the virtual machines; receiving commands entered, at least in part, using the GUI to perform actions on the detected computer system resources associated with the virtual machines; and executing actions corresponding to the commands entered using the GUI on the detected computer system resources associated with the virtual machines while maintaining the independence of the operating environments of the virtual machines.
摘要:
A method and system are described for using the structure and relationships between components in a component business model of an enterprise to assign components providing monitoring data to a management component. In response to the monitoring data, the management component executes a business rule invoking a service that alters a behavior of the enterprise. The management component contains data rules limiting the information provided by the assigned components, analysis rules defining the interaction between components, and report rules for consolidating recommendations for altering behavior of the enterprise, including decisions to invest in certain aspects of the business, to reengineer certain processes of the business, and to alter operation of certain aspects of the business.
摘要:
A method of managing instant messaging communication over a computer network is provided. One or more instant messaging session windows are organized in an instant messaging session manager. At least one distinguishing session characteristic is attributed to each of the one or more instant messaging session windows. The at least one distinguishing session characteristic is at least one of a sound clip associated with a user of the session, an instant messaging session window background associated with a user of the session, and a change in at least one of a color and an intensity of the instant messaging session window. The at least one distinguishing session characteristic increases a likelihood of identification of each of the one or more instant messaging session windows.
摘要:
A method, system and computer program product for generating an alternative form of transmitted environmental data, e.g., scent information, air temperature settings, air humidity settings, triggering of infrared devices such as to create tactile warmth. Upon identifying one or more environmental data files in a received file, e.g., HTML file, environmental data associated with the data files may be read and interpreted. If there are no environmental devices, e.g., smell-generating device, configured to emit a response to the environmental data or if the environmental devices are disabled from emitting a response to the environmental data, then the environmental data may be translated into a form a computer may be capable of reproducing. The translated form may then be outputted in a variety of forms such as: pictorial data (e.g., picture of a pine tree substituting a pine smell), graphical effects (e.g., screen-flashing effect may substitute a strobe-light trigger).
摘要:
A system, includes a user input device, a temperature changing unit coupled to the user input device, and a controller, coupled to the temperature changing unit, for controlling the temperature of the user input device.
摘要:
A web browser program presents historical information about hyperlinks shown on web pages. Initially, the computer determines whether it is receiving certain user input, such as placement of a cursor over a hyperlink for a certain time. When this occurs, the computer accesses a database to determine whether one or more users in a predefined access group have previously selected the hyperlink for the purpose of downloading underlying data represented by the hyperlink. Some examples of the underlying data include web pages, graphics images, software programs, and the like. If the hyperlink has not been previously selected, no action needs to be taken. However, if the database shows that the hyperlink has been previously selected, the computer consults the database to gather characteristics of the underlying data obtained from previous selections of the hyperlink by access group members. Such characteristics may include, for example, the data's size, date of last download, expired or “under construction” status of web site, errors occurring during the download, etc. The computer presents a report containing the characteristics gathered from the database.
摘要:
Using a writing surface, such as paper on a portable digital notebooks (PDNs) or the surface of a digital white board, users draw, on the fly, selectable items such as buttons with text inside. The user could even draw symbols, on the fly, in the air with his/her finger. The user then selects the drawn selectable item to initiate a function.
摘要:
A hand held pointing device for use with a computer system having a graphic interface. The pointing device includes a body, and a communications device within the body for communicating movement signals to the computer system. The pointing device further includes a movement detection device within the body, coupled to the communications device, for detecting movement of the body by a computer user. The pointing device additionally includes a pliant outer shell having at least a portion of the body which dynamically conforms to a computer user's hand when the pointing device is held and manipulated by a computer user, such that the portion of the body which conforms to the computer user's hand provides comfort and efficient ergonomic cushioning to the computer user during computer system pointing device activities. The pointing device further includes at least one user input device for transferring data to the computer system via the pointing device. In addition, the pointing device includes an interior shell which prevents the portion of the body from contacting interior electronics located within the pointing device. The pliant outer shell may also be surrounded by a membrane for preventing the rupture of the portion of the body. The pliant outer shell portion of the body may be composed of a gel based on an elastomer compound. Liquid-crystal material, controlled by a host computer, can also be located on the exterior of the pointing device to provide visual feedback to the computer user.
摘要:
Computer users access and/or execute a selected restricted function on a computer using a graphical user interface (GUI) by entering an iconic password that is defined by selecting two or more visual icons, called code icons, in a sequence called an iconic password sequence. The entered sequence is compared to a target sequence that represents the restricted function. If the entered sequence matches the target sequence, the user is permitted to execute/access the restricted function. The number of possible combinations in the target sequence, and therefore system security, can be increased by inputting both a code icon and a target site for one or more of the components of the target sequence.