摘要:
A self-healing device is provided in which changes made between the time that an infection resulting from an attack on the device was detected and an earlier point in time to which the device is capable of being restored may be recovered based, at least in part, on what kinds of changes were made, whether the changes were bona fide or malware induced, whether the changes were made after the time that the infection likely occurred, and whether new software was installed.
摘要:
A self-healing device is provided in which changes made between the time that an infection resulting from an attack on the device was detected and an earlier point in time to which the device is capable of being restored may be recovered based, at least in part, on what kinds of changes were made, whether the changes were bona fide or malware induced, whether the changes were made after the time that the infection likely occurred, and whether new software was installed.
摘要:
A system and method for protecting a computer system connected to a communication network from a potential vulnerability. The system and method protects a computer system that is about to undergo or has just undergone a change in state that may result in placing the computer system at risk to viruses, and the like, over a communication network. The system and method first detect an imminent or recent change in state. A security component and a fixing component react to the detection of the change in state. The security component may raise the security level to block incoming network information, other than information from a secure or known location, or information requested by the computer system. The fixing component implements a fixing routine, such as installing missing updates or patches, and on successfully completing the fixing routine, the security level is relaxed or lowered.
摘要:
A method and apparatus for backing up data in response to detection of an imminent threat to the integrity of the data stored on the storage component a computing device is disclosed. The storage component may be a hard drive and the imminent threat may be a hard drive failure or a malware threat. In response to the receipt of an imminent threat, data stored on the storage component is copied to a computer-readable media either automatically or in response to user input. The backup procedure is configured by selecting data to backup and a media of storage on which to store the backup. Various sources of threat events are described.
摘要:
A virtual machine host may provide IPv4 connections to IPv4 virtual machine guests and map the connections to IPv6 networks. The IPv6 addressed exposed by the virtual machine host may be used in an IPv6 environment to communicate with the virtual machine guests, enabling various IPv6 connected scenarios for the IPv4 virtual machines. The virtual machine host may receive IPv6 communications, and translate those communications to IPv4 to communicate with the virtual machine guests. Similarly, the outbound IPv4 communications may be translated into IPv6 for communications to the IPv6 network.
摘要:
A system and method using hardware and software components enable a storage module to maintain information about an associated storage device and its content such that the information is accessible when the storage device is offline or in a low power configuration. A general-computing host system connects to the storage module via a pluggable interface to provide information to a nonvolatile memory cache on the storage module. The storage module includes a separate power source, an output display, input buttons, and a module controller. The host system includes an application and host platform for processing file-system related events to send records to the module controller to automatically update a catalog representing storage device information in the nonvolatile memory. When offline, the user may display the catalog information and use the buttons to navigate among it. The host system may also allow the user to interactively review and modify the catalog.
摘要:
The subject disclosure generally relates to dynamic user experience adaptation and services provisioning. A user experience component can provide a user experience (UX) to a user. The UX can include, but is not limited to, an operating system, an application (e.g., word processor, electronic mail, computer aided drafting, video game, etc.), a user interface, and so forth. A monitoring component can monitor feedback generated in association with interaction with the user experience by the user. An update component can analyze the feedback, and update a user model associated with the user based at least in part on the analysis, and an adaptation component can modify the user experience based at least in part the user model.
摘要:
Data management techniques are provided for handling of big data. A data management process can account for attributes of data by analyzing or interpreting the data, assigning intervals to the attributes based on the data, and effectuating policies, based on the attributes and intervals, that facilitate data management. In addition, the data management process can determine relations among data in a data collection and generate and store approximate results concerning the data based on the attributes, intervals, and the policies.
摘要:
Techniques for efficiently performing queries are provided. A search component can receive a request for information based on data, and a management component can determine a degree of accuracy requested for the information. In turn, the search component can render the information based on the degree of accuracy requested. In an aspect, the search generates a query configured to determine the first information, and the management component instructs the search component to perform the query to a level of completion less than full completion when the degree of accuracy requested is below a predetermined threshold to cause the search component to render an estimation of the first information. In another aspect, a tracking component can track information associated with multiple query requests and an analysis determine and employ a related aspect of the tracked information to a new query request to determine an answer for a the new query request.
摘要:
Apparatus and methods for remoting of a console operating in a multi-session environment are described. A server process creates one or more proxy processes associated with login sessions. The proxy processes are controlled and managed by a session manager. The server manager can be instrumented to process the graphical information. The graphical information is eventually utilized for creating a visual representation on a client device as the output. The client device includes a client-side process or a client-side proxy, for processing information sent by the server, which is finally used for rendering the associated visual representation on the client device.