摘要:
Various embodiments provide a user interface that displays a history of resource usage of a computing device's applications over time. Historical resource usage data can be presented in a manner which informs the user, on an application-by-application basis, of each application's resource usage across a plurality of resources. In at least some embodiments, the user interface can provide one or more instrumentalities that enable the user to interact with and/or modify operational characteristics of various applications based upon the presented historical resource usage data.
摘要:
Operating system management of network interface devices is described. In one or more implementations, a determination is made by an operating system that network traffic associated with one or more applications of the computing device has completed. Responsive to the determination, a network interface device is caused to transition to a mode to reduce power consumption of the network interface device by the operating system.
摘要:
Described is a technology by which network connections are unified into a single user interface for user interaction with those networks. Upon receiving information identifying available networks that correspond to different types of media, a user interface component aggregates the available network connections and displays representations of the available network connections on the user interface. The result is a single user interface page on which the available networks are represented as available network connections that may correspond to destinations, for example by displaying a network name and/or a user-friendly name maintained in a network profile. Also displayable is connectivity status, security-related information, signal strength information for wireless network connections, and other information. The user may choose to show all available network connections, or only subset of the available network connections (e.g., only wireless, or only dial-up and VPN).
摘要:
Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device is monitored and a traffic pattern is recognized in the monitored network traffic. An application of the computing device is identified that corresponds to the recognized traffic pattern and responsive to this identification, at least a portion of the identified application is woken.
摘要:
A user interface for creating and joining meetings over a peer-to-peer network involves presentation of user interface windows including windows for selecting parameters corresponding to the ad-hoc network, activating sharing of Internet connections and joining an existing ad-hoc network by entering network name and optional password. The user interface further provides for entry of a country to select an appropriate wireless network protocol for use in that country when an attached wireless device supports such agility, for example, an 802.11(d) wireless network adapter.
摘要:
Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network.
摘要:
Methods and systems are described for simplified creation of, connection to, and termination from an ad hoc wireless network. Graphical user interfaces are used to guide users though creation and joining ad hoc network. The option to share one user's Internet connection with the entire ad hoc network is also described. The ad hoc networks described can provide some managed services traditionally unavailable in ad hoc networks, such as IP address assignment and name resolution services. The ad hoc networks can be created with termination criteria, such that a computer's connection to the ad hoc network is automatically terminated and previous network configuration settings are restored when one or a combination of termination criteria are met.
摘要:
Operating system management of network interface devices is described. In one or more implementations, a determination is made by an operating system that network traffic associated with one or more applications of the computing device has completed. Responsive to the determination, a network interface device is caused to transition to a mode to reduce power consumption of the network interface device by the operating system.
摘要:
A mobile computing device that supports cost aware network behavior. An operating system of the mobile computing device may associate data for transmission with a entity and, based on a policy applicable to that entity and information on data usage, determine appropriate processing for the data. The processing may include transmitting the data, with or without throttling, or blocking transmission of the data. The policy, for example, may be supplied by a user or may be encoded in a tag supplied with the data for transmission. The policies may be specified for entities such as an application, an operating system service, a user account or a category of applications. Enforcement of the determined processing may be based on action within the stack or a separate enforcement mechanism, such as a firewall.
摘要:
A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall, and therefore can operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through the Internet or other outside network, and therefore, because it is outside the private network firewall, should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller.