Patent application number | Description | Published |
20080228889 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DISTRIBUTING SOFTWARE BASED ON AN E-MAIL SERVICE - A solution for distributing software products is proposed. Typically, a software distribution infrastructure controls the deployment of software packages to selected endpoints; each software package includes commands and resource images, which are used to install a corresponding software product. For this purpose, an e-mail service is exploited. Particularly, a new e-mail message is created for each software package to be deployed; the software package is embedded into the e-mail message as an attachment and tags for controlling the software distribution process (such as a desired target state of the software package) are inserted into its body section. A plug-in of a mail client on each endpoint receives that e-mail message; the software package is then extracted and passed to an application engine, which controls its application according to the target state indicated by the corresponding control tag. | 09-18-2008 |
20090158438 | SOFTWARE LICENSE RECONCILIATION FACILITY - A method is presented for monitoring software product usage in a data processing system. The method may include installing an instance of a software product on a target entity of a data processing system. A usage condition applicable to the instance may be identified. Reconciliation information may be generated upon installation of the instance. This reconciliation information may correlate the usage condition with the instance to facilitate later determining compliance of the software product with applicable usage conditions. | 06-18-2009 |
20090276856 | LICENSE MANAGEMENT FACILITY - A method is presented for managing resource licensing. The method may include detecting an installed web server and/or application server to identify a container installation path, and identifying a resource associated with the container installation path. A resource installation path and a licensing structure may be determined for the resource. The method may further include building an application representation associating the resource installation path with the licensing structure, and determining the instances of resource use. The instances of resource use may be compared to the application representation to determine a licensing state for the resource. | 11-05-2009 |
20100005516 | METHOD AND SYSTEM FOR SECURE AGENT-LESS ENTERPRISE INFRASTRUCTURE DISCOVERY - A method and system for securing dynamic discovery of an enterprise computing infrastructure is provided. One implementation involves maintaining enterprise credential information in a secured trust store, receiving an access request through a secure connection for access to a remote infrastructure component, determining the type of the access request, for a root-level type access request, responding to the request via the secure connection with enterprise root credentials from the trust store, and for an unprivileged type access request, responding to the request via the secure connection with unprivileged access enterprise credentials from the trust store. | 01-07-2010 |
20100076926 | METHOD AND SYSTEM FOR DYNAMIC CONTACT INFORMATION MANAGEMENT IN ELECTRONIC COMMUNICATION DEVICES - A method and system for user contact information in electronic devices is provided. One implementation involves detecting a change in a user contact information at a first electronic device, determining effective date of the change in the contact information, storing the contact information change and effective date in a memory store, automatically communicating the contact information change and effective date to a second electronic device, and applying the received contact information change to a contact information list in a memory store of the second device, on or after the effective date. | 03-25-2010 |
20100192224 | SANDBOX WEB NAVIGATION - Browsing the World Wide Web may expose a user's system to malicious attacks that can lead to data loss and/or system failure. Sometimes a user desires to access information on a web page that may contain malicious content. For example, a college student researching computer hacking may need information provided on a hacking website even though the site is potentially dangerous. Although techniques are employed to install potentially harmful executable files into a sandbox (e.g., virtual machine), these techniques do not address navigation of harmful sites. Functionality can be implemented to instantiate a web browser within a controlled virtual environment (“sandbox”) that simulates the host system while restricting the virtual environment to designated space(s) and/or resources of the host system to prevent harmful effects. Instantiating the web browser in the sandbox allows web navigation of risky web sites without deleterious effects on the host system. | 07-29-2010 |
Patent application number | Description | Published |
20080228902 | Configuring processing entities according to their roles in a data processing system with a distributed architecture - A mechanism is provided for configuring different computers of a network. Each computer plays a specific physic role (defined by an architecture of the network) and/or a specific logic role (defined by the applications running in the network). A reference model and a transition table are associated with each product to be installed in the network; the reference model specifies a target configuration for each role (defined by the components of the product to be installed), while the transition table specifies the actions required to reach each target configuration from each current configuration of the computers. A server identifies the role and the current configuration of each computer; the actions required to enforce the desired target configuration on the computer are then established and executed. | 09-18-2008 |
20090150881 | Building and Installing Dynamic Installation Packages Using a Declarative Authoring Tool - Building a package for installing a software application on a data processing system with a distributed architecture is provided. The installation package is built using an authoring tool based on a declarative model. A descriptor is used to define a desired configuration of the system The installation package is built declaring a discoverer element, a producer element and a consumer element into the wizard tree. During the installation process, the discoverer element detects a current configuration of the system. The producer creates a working queue dynamically, inserting the installation operations that are needed for reaching the desired configuration from the current configuration of the system. The producer then executes the installation operations defined in the working queue. In this way, the installation operations are determined at runtime. | 06-11-2009 |
20090160675 | Method and System for Monitoring Road Surface Conditions - Monitoring road surface conditions using a mobile computer unit carried by a vehicle operating on a road network and adapted to detect information about the road surface conditions. The detection may be done by means of bump sensors which may also provide information on the size and the depth of the bump according to a detected shock with respect to the vehicle speed. Such information may then be transmitted to a central controller server. The central server may use the collected information for several purposes, such as help in planning maintenance of the road network; forwarded to users and vehicles for journey planning purposes; and to deviate traffic in case of extreme surface damage. | 06-25-2009 |
20090257596 | Managing Document Access - Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document. | 10-15-2009 |
20120233299 | MANAGING CONFIGURATIONS OF SYSTEM MANAGEMENT AGENTS IN A DISTRIBUTED ENVIRONMENT - A method, system and computer program product for managing system management agent configurations which include agent system management programs and program parameters in a distributed environment. A configuration management server sends upon request from the agents installed on the distributed system a description of their configuration. To this effect, the configuration management server maintains a database storing the agent configuration information, this database being usually updated by a system management administrator. The agents get from the server the list of peer distributed systems having the same agent configuration and their configuration from one distributed system of the list or obtain an agent configuration directly from the configuration management server if the peer distributed systems have modified their configuration. The agents advise the system management server when a new configuration has been installed. | 09-13-2012 |
20140089652 | CUSTOMIZING PROGRAM LOGIC FOR BOOTING A SYSTEM - A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The system is connected to one or more target systems via a network, the server system being adapted for: receiving a first list of device identifiers from one of the target systems; automatically selecting, for each of the device identifiers in the received first list, at least one driver operable to control the identified device from a set of drivers, thereby generating a sub-set of said set of drivers; providing a core program logic to the target system; and providing the sub-set of drivers to the target system, wherein a combination of the sub-set of drivers and the core program logic constitutes a customized program logic operable to control the devices of said target system. | 03-27-2014 |
20140095858 | CUSTOMIZING PROGRAM LOGIC FOR BOOTING A SYSTEM - A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The method includes determining the hardware devices operatively connected with the target system; sending a first list of identifiers of the determined hardware devices to a server system; receiving the first list of device identifiers; automatically selecting at least one driver operable to control the identified device, thereby generating a sub-set of said set of drivers; and complementing a core program logic with said driver sub-set to generate the customized program logic. | 04-03-2014 |
Patent application number | Description | Published |
20130151906 | Analysis of Tests of Software Programs Based on Classification of Failed Test Cases - A solution is proposed for analyzing a test of a software program comprising a plurality of software components, the test comprising a plurality of test cases each one for exercising a set of corresponding exercised software components. A corresponding method comprises the steps of receiving an indication of each failed test case whose current execution has failed, retrieving a suspicion attribute of each failed test case indicative of a change to the corresponding exercised software components since a previous execution of the failed test case, retrieving a change attribute of each failed test case indicative of a change to the failed test case since the previous execution thereof, retrieving a regression attribute of each failed test case indicative of a regression of the failed test case since the previous execution thereof, and classifying each failed test case into a plurality of disjoint classes according to the corresponding suspicion attribute, change attribute and regression attribute. | 06-13-2013 |
20130185595 | Analysis of Tests of Software Programs Based on Classification of Failed Test Cases - A solution is proposed for analyzing a test of a software program comprising a plurality of software components, the test comprising a plurality of test cases each one for exercising a set of corresponding exercised software components. A corresponding method comprises the steps of receiving an indication of each failed test case whose current execution has failed, retrieving a suspicion attribute of each failed test case indicative of a change to the corresponding exercised software components since a previous execution of the failed test case, retrieving a change attribute of each failed test case indicative of a change to the failed test case since the previous execution thereof, retrieving a regression attribute of each failed test case indicative of a regression of the failed test case since the previous execution thereof, and classifying each failed test case into a plurality of disjoint classes according to the corresponding suspicion attribute, change attribute and regression attribute. | 07-18-2013 |