摘要:
An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The processor identifies a user role for the current user based on the software application and/or usage data. The processor applies a security configuration to the client computing device based on the user role. The security configuration limits access by the current user to a portion of the software application. The processor sends an identifier of the user role to an administrative server for storage in an Active Directory (AD) database.
摘要:
A computing device that is configured for running a query on inventory information is described. The computing device includes a processor and instructions stored in memory that is in electronic communication with the processor. The computing device obtains inventory data. The computing device also obtains a query corresponding to the computing device. The computing device runs the query on the inventory data. The computing device further determines whether the query returns a record. The computing device additionally obtains a task corresponding to the query if a record is returned.
摘要:
Systems and methods for managing assets on a computing device are described. A computing device obtains one or more relationships between an electronic device and one or more related electronic devices. Relationship priorities of the relationships are obtained. The computing device displays an icon representing the electronic device and icons representing the related electronic devices. Also displayed are arrows representing the relationships. The arrows are displayed with differing thicknesses based on the relationship priorities.
摘要:
In an embodiment, a wireless data exchange network includes a wireless device (WD) operating under a wireless network communications protocol, a wireless access point (AP), operatively linked to the WD and a wired network, and operating under the wireless network communications protocol, and a wireless mobile device (WMD) capable of operatively linking with the WD and the AP, and operating under the network communications protocol. In another embodiment, a method for dynamically establishing a wireless data link between the WD and the AP wherein the WMD functions as a bridge there between, where the method may include determining the state of the data exchange link between the WD and the AP, selectively receiving and retransmitting data, by the WMD, from the WD to the AP and from the AP to the WD; and maintaining the wireless network communications protocol of the WMD during reception and retransmission of data between itself and the WD or the AP.
摘要:
General-purpose components are selectively included in a toolkit hosted by hosting provider computing devices. The general-purpose components are software components. The general-purpose components in the toolkit are available over a computer network to end user computing devices. The end user computing devices utilizes general-purpose components in the toolkit to provide system administration solutions. The system administration solutions are web applications hosted by the hosting provider computing devices. The system administration solutions provide an ability to perform administration tasks on on-premises computer systems of the end users. A hosting provider computing device is configured such that the end user computing devices are able to utilize the general-purpose components in the toolkit on a Software-as-a-Service (SaaS) basis.
摘要:
A computing device configured for mapping graph data into a tree structure is described. The computing device includes a processor and instructions stored in memory. The computing device obtains graph data. The computing device also maps the graph data into a tree structure. The computing device further applies the tree structure to a user interface. The computing device additionally displays the user interface and performs an operation using the tree structure.
摘要:
A method for automatically resetting a password is described. A failed login attempt in a system is identified. A failed login condition is determined to be satisfied. A user is prompted about resetting a password if the failed login condition is satisfied. A new password is generated based on user input. The new password is sent to the user via voicemail or email.
摘要:
A method for data recovery and destruction is disclosed. The method includes determining whether a network connection has been established by a computer system. If the network connection has been established, it is determined whether a specified server is accessible via the network connection. If the specified server is accessible, the specified server is accessed to determine whether a data recovery and destruction flag has been set for the computer system. If the flag has been set, a data recovery and destruction procedure is initiated. The data recovery and destruction procedure may involve transferring data from the computer system to at least one other computer system and then destroying at least a portion of the transferred data on the computer system.
摘要:
A method for determining when results from a first criteria scan are deleted from a computing device is described. A first criteria scan is performed on a computing device. Results of the first criteria scan are stored on the computing device. The computing device is disconnected from a first network. An inform packet is broadcast to at least one server. A response is received from the at least one server. The stored results of the first criteria scan are deleted if the computing device determines that the at least one server is not part of the first network.
摘要:
A computing device configured for enforcing a computing device power policy is described. The computing device includes a processor and executable instructions stored in memory that is in electronic communication with the processor. The computing device generates a power policy. The computing device also sends the power policy. The computing device further receives a suspicious process alert. Additionally, the computing device determines whether to terminate a suspicious process. The computing device also sends a process termination command if it is determined to terminate the suspicious process.