摘要:
Systems and methods (“tools”) are described that enable a user to access and interact with a remote desktop or application without the need to install a plug-in or software in addition to a web browser. In some embodiments, the tools include double buffering graphics that display the remote desktop or application, and caching images that are repeated. These tools may also include identifying the portion of the desktop or application that has changed and then transmitting the changed portion.
摘要:
A client device that includes a scaled remote protocol platform to support communication using a particular remote protocol A software and hardware platform independent micro core or micro client exposes interfaces in the client device to applications to support remote communication. The micro core may be extended to include additional features or service as needed by the client device.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for remote application control. In one aspect, a method includes collecting first metrics associated with an application. The method includes receiving a request from a client device. The method includes sending a response, the response comprising instructions to alter the flow of the application. The method includes collecting second metrics associated with the altered application. The method includes comparing the first metrics and the second metrics.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for remote testing. In one aspect, a method includes receiving a first message from a first user device indicating initialization of a client application. The method includes determining that the first user device is a member of a first testing group. The method includes identifying a first testing component associated with the first testing group and capable of altering the client application. The method includes sending the first testing component to the first user device.
摘要:
Techniques described maintain privacy of a remote desktop client when the remote client interacts with and displays the desktop of the host device. The described techniques enable such privacy and control even when the host computing device does not run an operating system with session support. The host includes a virtual display driver, which is not associated with a physical display, and a physical display driver, which is associated with a physical display. The techniques associate the virtual display driver with a mirror driver of the host, while disassociating the physical display driver from the mirror driver. The mirror thus driver provides contents of the virtual display to the remote client. Additionally, because the virtual display driver is not associated with a physical display, the contents of the virtual display (and hence the interactions of the remote client) are not displayed at the host.
摘要:
Enabling a user interface (UI) for management of a host device from a client device. A connection is established between the host device and the client device via a web portal. The host device and the client device are without a host management software installed thereon. A content window is displayed on the client device in response to the established connection with the host device. A client status display area is displayed on the client device indicating at least a connection status with the host device. A corresponding host status display area is displayed on the host device indicating a connection status with the client device. The displayed client status display area specifically identifies the client device and defines client parameters for receiving messages during management of the host device. The displayed host status display area specifically identifies the host device and defines host parameters for receiving messages during interaction with the client device.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a device aware social graph. In one aspect, a method includes deciding to send a message to a user, the user being associated with devices. The method also includes selecting a user device from among the devices. The method also includes determining a message method. The method also includes obtaining an identifier associated with the user and the message method. The method also includes sending a message to the device using the message method and the identifier.
摘要:
A system and machine-implemented method for presenting profile information on an electronic device of a user, the profile information being associated with a contact of the user, via displaying a contact icon on a graphical user interface of the electronic device, the contact icon corresponding to a contact of the user; receiving user input which specifies selection of the contact icon; and displaying profile information, obtained from a profile associated with the contact corresponding to the selected contact icon, on the graphical user interface.
摘要:
Techniques described maintain privacy of a remote desktop client when the remote client interacts with and displays the desktop of the host device. The described techniques enable such privacy and control even when the host computing device does not run an operating system with session support. The host includes a virtual display driver, which is not associated with a physical display, and a physical display driver, which is associated with a physical display. The techniques associate the virtual display driver with a mirror driver of the host, while disassociating the physical display driver from the mirror driver. The mirror thus driver provides contents of the virtual display to the remote client. Additionally, because the virtual display driver is not associated with a physical display, the contents of the virtual display (and hence the interactions of the remote client) are not displayed at the host.
摘要:
Embodiments herein address some of the problems associated with compromised configuration files used in a remote sessions of a virtual computing environment. Accordingly, a subset of settings in a configuration file are secured from malicious or accidental modification, while other portions of the configuration file are modifiable by a user as desired without invalidating the integrity of the secure subset. This not only allows for the user to be assured of the integrity of the settings, but also allows an administrator of the remote or terminal server with the ability to control how and what access a client has to resources thereon. Such access may be further controlled based on a trust level between the client, server, and/or publisher of the configuration file.