摘要:
Inter-service messages conform to a protocol message schema and support predetermined types according to the destination service. Because the schema and types are well defined, input queues corresponding to the services are able to quickly identify and remove non-conforming messages. The schema supports both prepaid and subscription business models and is extensible to other types.
摘要:
Task sequences are used to manage devices. According to one aspect, a user-defined or user-selected task sequence is received. The task sequence is converted into an ordered series of steps, and the series of steps are performed, in accordance with their order, in managing a device over a network. In certain implementations, the ordered series of steps are steps for automatically deploying an operating system on the device.
摘要:
According to one aspect of task sequence interfaces, a method includes exposing an interface that allows task sequences to be performed on a plurality of remote devices, and receiving requests regarding the task sequences and the plurality of remote devices via the interface. The interface comprises an object model including device objects that represent physical devices in a network, and jobs objects that represent task sequences performed on one or more of the plurality of remote devices.
摘要:
Task sequences are used to manage devices. According to one aspect, a user-defined or user-selected task sequence is received. The task sequence is converted into an ordered series of steps, and the series of steps are performed, in accordance with their order, in managing a device over a network. In certain implementations, the ordered series of steps are steps for automatically deploying an operating system on the device.
摘要:
Task sequences are used to manage devices. According to one aspect, a user-defined or user-selected task sequence is received. The task sequence is converted into an ordered series of steps, and the series of steps are performed, in accordance with their order, in managing a device over a network. In certain implementations, the ordered series of steps are steps for automatically deploying an operating system on the device.
摘要:
Multiple devices on which operating systems can be automatically deployed are managed. According to one aspect, an apparatus manages installation of operating systems on a plurality of computing devices. The installation is performed across the plurality of computing devices both concurrently and asynchronously.
摘要:
Inter-service messages conform to a protocol message schema and support predetermined types according to the destination service. Because the schema and types are well defined, input queues corresponding to the services are able to quickly identify and remove non-conforming messages. The schema supports both prepaid and subscription business models and is extensible to other types.
摘要:
Linked databases including a core database and a distribution database support provisioning for computers in pay-per-use and subscription business models. The core database is well removed from front-end processing and includes job, device and bootstrap tables. The distribution database includes tables for packet distribution and logging and is near the front-end processing blocks. The core database is well protected from attack, while the more volatile data in the distribution database is available with low latency. Performance is maintained while reducing the surface area exposed to external attack.
摘要:
An application program interface (API) for sending and receiving batches of requests and responses has a batch request call for exchanging one or more request items between a provider system and a subscription system and a batch response call for exchanging corresponding responses between the provider system and the subscription system. Requests are grouped according to an extensible markup language schema and responses are grouped according to another extensible markup language schema.
摘要:
A computer participates in a system for licensing use in a metered fashion using individual licenses cryptographically linked to the computer and a particular service provider or underwriter. The computer may have a cryptographic unit, secure memory, sanction and metering functions as part of a secure execution environment for enabling metered operation and conformance to a security policy. Payment for licenses may be made through a payment system with licenses generated at a server with access to cryptographic functions for verification of requests, certificate/key pair generation, and signing licenses.