摘要:
A computer-implemented method for determining whether to reschedule tasks on computing devices based on power-availability information for a power grid may comprise: 1) identifying at least one task scheduled to execute on a computing device, 2) receiving power-availability information for the power grid, and then 3) determining, based on the power-availability information, whether to reschedule the task. Corresponding systems and computer-readable media are also disclosed.
摘要:
A method and apparatus for using a remote delegate is described. In one embodiment, the method comprising evaluating information that identifies at least one of software packages resident in a client computer or licenses associated with the software packages using a remote delegate and enabling use of a resource at the client computer based on the information through use of the remote delegate.
摘要:
Method and apparatus for monitoring product purchasing activity on a network are described. In some examples, processing of network traffic in a network is performed. Web content is extracted from the network traffic at a node in the network. A statistical analysis of the web content is performed to detect product purchasing activity. Product attributes associated with the product purchasing activity are extracted. The product attributes are stored in a log implemented in a memory on the network.
摘要:
A computer-implemented method for sharing logs of a child's computer activities with a guardian of the child is disclosed. The method may include determining that a child may be involved in a computer activity on a computing device that is not controlled by a guardian of the child, monitoring the computer activity, creating a log of the computer activity, determining that the guardian of the child is authorized to view the log of the computer activity, and providing the log of the computer activity to the guardian of the child. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
The performance of a boot sequence is improved by presenting the user with easy to read information concerning the performance cost of each boot time application, and allowing the user to remove processes from the boot sequence or uninstall them altogether. Processes associated with the boot sequence are identified, and their corresponding performance cost is determined as percentage of the performance cost of the entire boot sequence, or according to the time they take to execute. The identified processes and their associated performance costs are presented to the user, along with a user interface component for selecting processes to remove from the boot sequence and/or uninstall. Responsive to input from the user, selected processes are removed from the boot sequence and/or uninstalled as directed.
摘要:
A computer-implemented method for correlating online aliases with real-world identities may comprise accessing a first user account associated with a first online communication mechanism, obtaining contact data associated with a first online alias from the first user account, identifying contact data associated with a second online alias, identifying, by comparing the contact data associated with the first online alias with the contact data associated with the second online alias, at least one common characteristic between the first online alias and the second online alias, and associating both the first online alias and the second online alias with a common contact. A graphical user interface may display a contact's name, online aliases for by the contact, and the online communication mechanisms that may be used to communicate with the contact. The method may also facilitate communication with a contact using online communication mechanisms. Corresponding systems and computer-readable media are also disclosed.
摘要:
Outbound network traffic originating from a client is filtered, to check for files targeted for upload to remote sites. When a file targeted for upload to a remote site is detected, a remote storage location at which the client's backup data is stored is checked for a copy of the detected file. If a copy of the file is located at the remote backup site, that copy is substituted for the client copy in the network transmission to the target remote site. By uploading online copies of files when available, the client upload experience is much faster, and local bandwidth is preserved for other tasks.
摘要:
A method and apparatus for monitoring sensitive data on a computer network is described. In one embodiment, a method for protecting sensitive data from being leaked to a computer network comprises monitoring data related to a user that is presented on one or more web pages through a common interface, which enables a search for sensitive data on the one or more web pages of the one or more web sites and determining a disclosure of the sensitive data on a web page of one or more web pages.
摘要:
A computer-implemented method for managing power usage of a computing device based on power-management information from a power grid may comprise: 1) receiving power-management information from a power grid, 2) identifying power-usage requirements of the computing device, and then 3) determining, by analyzing the power-management information and the power-usage requirements of the computing device, whether to adjust power usage of the computing device. The method may also comprise adjusting the power usage of the computing device in accordance with the power-management information. Corresponding systems and computer-readable media are also disclosed.
摘要:
A parental control system is used to verify the identity of parents, based on children's instant messaging aliases. A plurality of verified parental accounts is maintained, each of which includes the identity of the parents and their children, including the children's instant messaging aliases. When a first child wishes to electronically communicate with a second child, s/he makes a request which includes the second child's alias. The parental accounts are searched for the second child's alias. If the alias is not found, instant messaging between the children is not allowed. If an account containing the alias is found, an identity verification request is transmitted, disclosing the identity of the first child's parents, and requesting reciprocal identity verification. Only if the second child's parents disclose their identity is the instant messaging between the children permitted.