摘要:
Methods and computer storage media for displaying shared resources of a sharing device to which a computing device of a network has access are provided. Shared resources of a sharing device are determined. A message is generated that includes information regarding the shared resource. The message is communicated to a computing device that interprets the message to identify those resources that are shared with the computing device. Upon determining those resources that the computing device has access rights, the computing device provides an indication for a user that facilitates the utilization of those shared resource to which it has access rights. In some embodiments, the message is securely communicated.
摘要:
A method, system, and medium are provided for sharing items residing on a computing device. Items selected for sharing can be made simultaneously available to users on a local network and to users outside of the local network. A remote sharing service allows access to copies of items based on user identifiers associated. Local attributes associated with items are modified such that the user identifiers are associated with the items for providing access via a local network.
摘要:
Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices.
摘要:
System(s), techniques, and/or method(s) (“tools”) are described that enable a user to elevate his or her rights. The tools may do so by switching a user to an account having higher rights or a different, higher-rights context of a same account. The tools may elevate a user's rights after a user enters a secure access sequence, such as Control+Alt+Delete, clicks on a button, or enters credentials. The tools may also enable a user to identify tasks that need higher rights to be performed by visually correlating graphic indicia with these tasks.
摘要翻译:描述了使用户能够提升他或她的权利的系统,技术和/或方法(“工具”)。 这些工具可以通过将用户切换到具有较高权限的帐户或相同帐户的不同的,较高权限的上下文来实现。 用户输入安全访问顺序后,例如Control + Alt + Delete,点击按钮或输入凭据,这些工具可以提升用户权限。 这些工具还可以使用户能够通过将图形标记与这些任务视觉上相关联来识别需要更高权限执行的任务。
摘要:
Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on the peer group and associated computing devices, using a communications layer and an authorization layer. Allowing a new computing device to join a peer group includes inviting the new device to join and then challenging the device for a passkey of the peer group. After joining the peer group, the computing device will be able to access and share resources with the peer group and other computing devices associated with the peer group.
摘要:
A method, system, and medium are provided for sharing items residing on a computing device. Items selected for sharing can be made simultaneously available to users on a local network and to users outside of the local network. A remote sharing service allows access to copies of items based on user identifiers associated. Local attributes associated with items are modified such that the user identifiers are associated with the items for providing access via a local network.
摘要:
Computer-readable media, computerized methods, and computer systems for acting on properties of multiple resources, which span disparate locations within a network, upon detecting an intuitive user-initiated operation are provided. Initially, a library is provided that includes a framework for contemporaneously accessing a collection of items within a scope thereof. Upon launching the library, representations of the scoped items are surfaced at a UI display. When the user-initiated operation is applied at one of the surfaced representations, properties of each of the scoped items are automatically manipulated. A library-configuration state, which reflects how the items are affected upon manipulating the properties thereof, may be updated upon implementing the manipulation. Accordingly, if the scope of the library is subsequently extended to encompass another item outside the original collection of items, the properties of this new item are automatically manipulated to align with the library-configuration state.
摘要:
System(s), techniques, and/or method(s) (“tools”) are described that enable a user to elevate his or her rights. The tools may do so by switching a user to an account having higher rights or a different, higher-rights context of a same account. The tools may elevate a user's rights after a user enters a secure access sequence, such as Control+Alt+Delete, clicks on a button, or enters credentials. The tools may also enable a user to identify tasks that need higher rights to be performed by visually correlating graphic indicia with these tasks.
摘要翻译:描述了使用户能够提升他或她的权利的系统,技术和/或方法(“工具”)。 这些工具可以通过将用户切换到具有较高权限的帐户或相同帐户的不同的,较高权限的上下文来实现。 用户输入安全访问顺序后,例如Control + Alt + Delete,点击按钮或输入凭据,这些工具可以提升用户权限。 这些工具还可以使用户能够通过将图形标记与这些任务视觉上相关联来识别需要更高权限执行的任务。
摘要:
Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on the peer group and associated computing devices, using a communications layer and an authorization layer. Allowing a new computing device to join a peer group includes inviting the new device to join and then challenging the device for a passkey of the peer group. After joining the peer group, the computing device will be able to access and share resources with the peer group and other computing devices associated with the peer group.
摘要:
A system and related techniques prepare and condition the installation of new networked service or application components, such as Internet services, based on an individual subscriber's subscribed-to services, features and other components. A subscriber to an Internet service may choose to add, for example, a componentized subscription to a music or video download service to their access plan. When the user inserts a CDROM or accesses a Web site for installation, the user may be prompted for a username or passport-type object to authenticate their account. The user may then be presented with a set of available service selections, extensions or enhancements to choose to add to their plan. Those available selections may be prefiltered or prequalified, for example, based on geographic location, account spending or access limits, language or other criteria. Because the installation engine delivers components which are intelligently filtered at time of installation, the service components or applications can be tailored to that specific user's needs and options, instead of downloading or installing a monolithic package which may contain services not available or of interest to that user.