摘要:
A system automatically determines probable idle times for a computing system and performs maintenance tasks, such as virus scanning, during these times. A prediction of probable idle times is based on an assessment of a user's past use or by an aggregate of information from several users if a company wishes to determine optimal times for running such tasks or pushing software patches to employees. A policy table set by the user or a company determines the priority of maintenance tasks to be run during the predicted idle time.
摘要:
Systems and methods to access password-protected stored data when a corresponding data password has been lost, forgotten, or is otherwise unavailable, and to recover the data password to facilitate access to the password-protected data from a digital memory device such as a hard disk drive associated with a user computer. In some embodiments the computer is communicatively coupled with a network and receives at least one encryption key from a secure computer via the network. In other embodiments the computer is a stand alone computer and receives at least one encryption key from a removable, non-volatile memory such as a CD ROM. The encryption key is used to encrypt the data password and both are stored on the hard disk drive. If the data password becomes lost, forgotten, or otherwise unavailable, the encrypted password is recovered from the hard disk drive and decrypted to recover the data password.
摘要:
A technique is disclosed for storing an electronic record of the existence of licenses available for use in a network of computers and the deployment status of programs covered by the licenses. License tokens are stored on a license server, and the stored license tokens are used to validate the deployment of applications stored on clients associated with the license server. The license server maintains the license tokens for all licensed applications used by the associated clients and maintains a license file for each client. Periodically, the license file containing token data is sent to the pre-boot environment of each client in the system, e.g., by a synching process. A license-maintenance application residing in the pre-boot environment of each client validates the applications stored on the client by comparing them with the token data in the license file upon the occurrence of a pre-boot process.
摘要:
A method and system is presented for making a client computer compliant with a data security regulatory rule. A client computer is connected to a network that includes a compliance fix server. The compliance fix server determines if the client computer is in compliance with a data security regulatory rule, based on a level of compliance at which that the client computer is authorized. If the client computer has not executed the appropriate compliance software required to put the client computer in compliance with the data security regulatory rule, then the compliance fix server sends appropriate compliance software to the client computer for installation and execution.
摘要:
A method and system for providing diagonal scrolling on a touchpad of a device is disclosed. The method and system comprises determining if at least one finger is in contact with the touchpad, and entering a diagonal scroll mode if more than one finger is in contact with the touchpad. A system and method in accordance with the present invention allows the user to initiate a diagonal scroll at any location on a touchpad by using two fingers, thereby greatly enhancing the functions of the touchpad and allowing the user to manipulate computer programs from the touchpad much more efficiently and easily. The present invention supports diagonal scrolling on a touchpad and does not require a precise location for vertical or horizontal scrolling, since the entire touchpad area/surface can be used. The system and method in accordance with the present invention will also operate correctly on existing touchpads when a change in software drivers has been carried out.
摘要:
A network includes a plurality of wall plates, each of the wall plates couples a network resource such as a computer or a network attached device to the network and includes an RFID circuit to detect proximate devices having an RFID tag. The proximate devices can be network attached devices or non network attached devices such as desks, phones, and artwork. Logic is included within each wall plate which includes wall plate physical location information. The logic is designed to respond to a broadcast signal. In so doing, the physical location of any resource can be determined. The physical location of all known resources are provided to an inventory application in the network, thereby allowing network administrators and users to remotely determine the physical location (room, floor, building, etc.) of any and all known resources attached to the network. Likewise, local computer users are able to identify the network resources located in their vicinity.
摘要:
Apparatus, methods and program products by which the user of a computer system is notified of the desirability or urgency of initiating an interval during which the user leaves the system idle to permit some communication or update from a network with which the system is in communication.
摘要:
A system and method that restores a computer system is provided. An image is created of a primary drive that includes an operating system and one or more applications. A copy of the image is stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. Patches are received for the operating system and the applications and applied to the corresponding operating system or applications. A copy of the patch files is stored in the second nonvolatile storage area. When the system is restored, the primary drive is reformatted and the image stored on the second nonvolatile storage area is copied to the primary drive. The patches stored on the second nonvolatile storage area are then applied to the operating system and applications included in the image that was copied to the primary drive.
摘要:
A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
摘要:
A client computer is connected via a network to an anti-virus server and polls the server for indication that an anti-virus needs to be immediately downloaded from the anti-virus server. The client computer disengages from the network, and re-establishes a link with only the trusted anti-virus server. The anti-virus fix is installed, the client computer re-booted, and the client computer is then allowed to reconnect to the full network. If the client's primary operating system (OS) is infected, a secondary OS in the client computer performs the anti-virus download and execution. The disengagement from the network is performed by applying a filter in a network interface card (NIC) driver by the primary OS, the secondary OS, a service processor (SP), or by a virtual machine manager (VMM), depending on which is available at the client computer.