摘要:
Mechanisms for securing dynamic discovery of an enterprise computing infrastructure is provided. One implementation involves maintaining enterprise credential information in a secured trust store, receiving an access request through a secure connection for access to a remote infrastructure component, determining the type of the access request, for a root-level type access request, responding to the request via the secure connection with enterprise root credentials from the trust store, and for an unprivileged type access request, responding to the request via the secure connection with unprivileged access enterprise credentials from the trust store.
摘要:
A method and system for securing dynamic discovery of an enterprise computing infrastructure is provided. One implementation involves maintaining enterprise credential information in a secured trust store, receiving an access request through a secure connection for access to a remote infrastructure component, determining the type of the access request, for a root-level type access request, responding to the request via the secure connection with enterprise root credentials from the trust store, and for an unprivileged type access request, responding to the request via the secure connection with unprivileged access enterprise credentials from the trust store.
摘要:
Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.
摘要:
Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.
摘要:
A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions.
摘要:
A method of managing a shared electronic mail account co-owned by at least two owners includes intercepting electronic mail account configuration settings received from the at least two owners; combining the intercepted electronic mail account configuration settings based on a shared electronic mail account profile so as to generate shared e-mail account configuration settings; and applying the shared e-mail account configuration settings so as to affect the operation of the shared electronic mail account.
摘要:
A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.
摘要:
A vehicle-mountable system is provided for monitoring road surface defects. The system may include a detector to detect a surface defect in a road surface along which a vehicle is traveling. A positioning system may determine an instant location of the vehicle, and a repository may store a location of the surface defect with reference to the instant location. A controller unit may receive and compare the instant location with the location of the surface defect to identify an imminent surface defect encounter. The controller unit may also identify guidance instructions to minimize an effect of the imminent surface defect encounter. Finally, an interface may relay the guidance instructions to the vehicle.
摘要:
Monitoring road surface conditions using a mobile computer unit carried by a vehicle operating on a road network and adapted to detect information about the road surface conditions. The detection may be done by means of bump sensors which may also provide information on the size and the depth of the bump according to a detected shock with respect to the vehicle speed. Such information may then be transmitted to a central controller server. The central server may use the collected information for several purposes, such as help in planning maintenance of the road network; forwarded to users and vehicles for journey planning purposes; and to deviate traffic in case of extreme surface damage.
摘要:
Monitoring road surface conditions using a mobile computer unit carried by a vehicle operating on a road network and adapted to detect information about the road surface conditions. The detection may be done by means of bump sensors which may also provide information on the size and the depth of the bump according to a detected shock with respect to the vehicle speed. Such information may then be transmitted to a central controller server. The central server may use the collected information for several purposes, such as help in planning maintenance of the road network; forwarded to users and vehicles for journey planning purposes; and to deviate traffic in case of extreme surface damage.