摘要:
A method and system for automatically configuring devices in a network is disclosed. A network management software application is provided that enables a user to associate policy settings with physical locations in the network. During an operational mode of the network management application, the application automatically detects when a network device is plugged into the network, and determines a location of the device in the network. The device is then automatically configured based on the policy settings associated with the corresponding location.
摘要:
A method and system for automatically configuring devices in a network is disclosed. A network management software application is provided that enables a user to associate policy settings with physical locations in the network. During an operational mode of the network management application, the application automatically detects when a network device is plugged into the network, and determines a location of the device in the network. The device is then automatically configured based on the policy settings associated with the corresponding location.
摘要:
Provided are techniques for state information sharing. At least one of user information and browser information is stored in a first configuration file in a first file format associated with a first browser application. A change in at least one of the user information and the browser information in the first configuration file is recognized. The changed at least one of the user information and the browser information in the first file format is converted to a second file format associated with a second browser application. A second configuration file is updated with the changed at least one of the user information and the browser information in the second file format. In response to starting the second browser application, a user and browser state is set using the user information and the browser information in the second configuration file.
摘要:
Systems and methods for configuring a UI display layout for displaying record fields in a multi-tenant on-demand database service. A data record is initially displayed on a first portion of a user interface display, and an identification of a set of one or more fields of the data record is received, e.g., from a user. A selection of a display configuration for the set of identified fields is also received, e.g., from a user. The display configuration may include one or more columns, each column having one or more rows, wherein the display configuration identifies, for each of the set of fields, in which column and row the field is to be displayed. Data for the set of fields based on the selected display configuration is then displayed on a second portion of the user interface display which may include a collapsible display panel.
摘要:
A method and system for monitoring calls being made from a cellular phone and preventing calls being made to unauthorized numbers, as defined by the owner of the cellular phone. A security challenge is issued to a cell phone user when a suspicious, previously unknown telephone number is attempted to be called. Approved/safe numbers and/or area codes are stored within the phone and/or in a subscriber's account accessible and updated via the Internet. If the user is unable to provide the correct security code in response to the challenge, the user is prevented from making the call to the particular number.
摘要:
A method for preventing a browser timeout resulting from multiple requests sent from a client to a server is provided. In response to receiving a request from the client, an application thread is initialized on the server for submitting data to the client. The application thread is observed using a daemon observation thread. If a loading time of the application thread exceeds a timeout, the application thread is terminated. In response to terminating the application thread, an empty response is sent to the client. In response to receiving the empty response to the client, a determination is made whether to make an additional request to the server.
摘要:
In accordance with embodiments, there are provided mechanisms and methods for performing an action associated with a record. These mechanisms and methods for performing an action associated with a record can enable improved data access, simplify and expedite a user's workflow, etc.
摘要:
A method and system for monitoring calls being made from a cellular phone and preventing calls being made to unauthorized numbers, as defined by the owner of the cellular phone. A security challenge is issued to a cell phone user when a suspicious, previously unknown telephone number is attempted to be called. Approved/safe numbers and/or area codes are stored within the phone and/or in a subscriber's account accessible and updated via the Internet. If the user is unable to provide the correct security code in response to the challenge, the user is prevented from making the call to the particular number.
摘要:
A computer system, method and program are provided which offer a user a simple way to access alternatives to the “home page” web site on initiating operation of a browser program. In particular, a browser program in accordance with this invention offers a user the option of opening a session directly to the preselected “home page” web site or displaying a list of alternatives from which the user may select another web site as the site accessed as the browser program initiates. With other application programs, the alternatives may be such as providing a user with the option of selecting a particular document to open in a word processing program or a particular mail server for an email program.
摘要:
Disclosed are examples of apparatus, methods, and computer readable storage media for informing one or more users of social network data such as group data when the data is relevant to the user(s). For example, when one or more keywords are identified as being associated with both a group of an online social network and the user, a communication with information identifying the group data can be generated and provided to a display device accessible by the user. In another example, social network data is associated with an entity of the online social network, and the entity is not being followed by the user. Social network data identified as related to one or more keywords can be provided to a display device in a suitable presentation accessible by the user.