Patent application number | Description | Published |
20080243699 | License optimization and automated management - A license management system may include a license analyzer that is capable of evaluating different licensing strategies for software products or services on a single device or a group of devices. Rules for licensing options are coupled with actual usage data and forecasts to determine various licensing options. The options may be implemented by an automated system for renewing licenses or changing licenses and installing updated licenses. | 10-02-2008 |
20080243827 | Query generation using enviroment configuration - A query for a help system includes data about a user system and a task that the user is attempting. The query may be used by a search engine to generate relevant results to aid the user. The user system data may include configuration data about hardware and software. The task data may be derived from the current state of a device, or from operational history that may be developed from a single user or a group of users. The query may have a mechanism to weight various keywords or components of the query and a feedback system may adjust the weights for future queries. | 10-02-2008 |
20080244691 | Dynamic threat vector update - A security manager aggregates various security components into a unified user interface. For each security component, the security manager may obtain an updated policy description that defines specific groups of settings for the component in terms of several threat conditions. Using the groups of settings, the security manager may classify a current state of a security component into a category. Some embodiments may use a standardized schema for an interface between a security component and the security manager. The schema may be implemented with an adapter that translates the specific settings of a security component into data for the security manager. In some embodiments, the adapter may also receive updated policy descriptions and perform a classification of the current settings. | 10-02-2008 |
20080250405 | Parallel installation - Installation of multiple servers with interdependencies is done in parallel steps, with each server advancing in sequence with other servers. When a second server is dependent on a first server during the installation process, the first server may finish a task and send a message to the second server to attempt an installation step that depends on the first server. If a problem occurs, the second server may revert to a configuration state before the attempted step and the first server may reattempt the installation step on which the second server depends. | 10-09-2008 |
20090100158 | Backup and Recovery System for Multiple Device Environment - A backup system stores configuration data for several interdependent systems in a single backup store. As the systems are being configured and when changes are made to the systems, the backup store is updated with the change. The systems may be configured with each system having a designated role. During a restore operation, an otherwise unallocated system may assume a particular role and use the configuration logic defined for the role that may be taken from the backup store. The system may perform the restore in conjunction with the other systems and the interdependencies with the systems. | 04-16-2009 |
20090177646 | Plug-In for Health Monitoring System - A monitoring and management system may use a plugin mechanism to add or update an interface to a managed service or device. The plugin may have capability to interface with the managed service or device, as well as an interface to a status database that may be populated by the managed service or device as well as other services or devices. The plugin may have rules that may be used to determine a status for the monitored service or device based on the statuses of several services or devices, and may also have rules that define a multi level query into the database to determine those services and devices. | 07-09-2009 |
20090187648 | Security Adapter Discovery for Extensible Management Console - An extensible management console may use a discovery mechanism to detect and identify security services across a network. After identification, the console may download and install an adapter so that the security service may be monitored and controlled using the extensible management console. A catalog of security services may be obtained from a catalog server and used to scan various devices, registries, file systems, and active services to detect and identify security services that may be added to the extensible management console. | 07-23-2009 |
20090198764 | Task Generation from Monitoring System - A publication/subscription distribution mechanism receives alerts from an enterprise monitoring system, formats the alerts into a task capable of being managed by a task management application, categorizes the task into one or more subscription categories, and distributes the tasks to subscribers for the subscription categories. The distribution mechanism may automatically translate between an enterprise monitoring system and several different task management applications and may enable automated tracking of error conditions and their resolutions from detection to completion. | 08-06-2009 |
20100017843 | Scenario Based Security - A security management system uses several security scenarios that have rules defining the configuration of system and security components in order to meet a specific security scenario. The rules may include an evaluation of multiple components to give a summary statistic or evaluation, as well as rules that may be used to configure the various components to achieve a desired level of security. A management console may aggregate multiple security scenarios together for administration. | 01-21-2010 |
20100042988 | Installation Management using Virtual Machines - Computer components may be installed and configured using virtual machines, where a trusted relationship with a virtual machine is created when a virtual machine is launched on a device with an installation manager. The installation manager may provide configuration options, scripts, and other information to a configuration agent operating in the virtual machine. Additional virtual machines may be launched on other devices and trusted relationships established with the installation manager, which may also manage configuration agents on the additional virtual machines. In some embodiments, a remote controller may be used to control functions of the installation manager. | 02-18-2010 |
20100235321 | PROGRAMMING MODEL FOR SYNCHRONIZING BROWSER CACHES ACROSS DEVICES AND WEB SERVICES - A computer user may use a computing environment comprising a set of computers that respectively feature a web browser having a browser cache containing many types of data objects, including application resources and user-generated data files. However, the contents of a browser cache significantly contribute to the computing environment of a computer, and the computing environments presented by each computer may diverge, providing an inconsistent computing environment. Instead, the contents of browser caches of the computers comprising the computing environment may be synchronized across computers. Additionally, the browser cache may be synchronized with the other data objects of a computing environment (such as relevant portions of the filesystem); the synchronizing may be implemented as an out-of-browser process executing independently of the applications, and even when the browser is not executing; and the synchronization may be exposed through a programmatic access with which web applications may interact. | 09-16-2010 |
20100235829 | PROGRAMMING MODEL FOR INSTALLING AND DISTRIBUTING OCCASIONALLY CONNECTED APPLICATIONS - An application executing in a virtual environment, such as a web browser, may be serviced by an application host, such as a webserver that maintains application resources or provides runtime services to the application. However, it may be difficult to configure the application to operate suitably when the application host is unavailable. Techniques for facilitating such operation include the storing of application resources in a computing environment (such as the local file system or a deployable mesh or cloud environment) while also initiating the application within the virtual environment in the context of the application host, which may reduce difficulties with isolation policies imposed by the virtual environment (e.g., cross-domain restrictions imposed by the web browser.) This configuration may promote the servicing of the application alongside other applications and data objects, e.g., the automated deployment and synchronization of the application among all devices comprising the user's mesh environment. | 09-16-2010 |
20100235830 | PROGRAMMING MODEL FOR APPLICATION AND DATA ACCESS AND SYNCHRONIZATION WITHIN VIRTUAL ENVIRONMENTS - Applications executing on computer systems may execute in a virtual environment, such as a web application executing in a web browser. An application may access the actual computing environment (such as the filesystem), but this accessing may be complicated; e.g., the computing environment may be deployed across many computers and devices, and may be synchronized for offline access via a local cache. A computing environment component may service the complex computing environment (e.g., by managing the cache and retrieving remotely stored data objects) and expose it as a well-organized set of data objects. A virtual environment interface (e.g., a web browser plug-in) may allow applications hosted in the virtual environment to access the computing environment through the computing environment component. Programmatic interfaces may also be implemented to permit such accessing via familiar programming languages and techniques, such as JavaScript libraries exposed to web applications in the web browser. | 09-16-2010 |
20110307738 | Web Application Transitioning and Transient Web Applications - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-15-2011 |
20110307794 | WEB APPLICATION NAVIGATION DOMAINS - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-15-2011 |
20110307811 | WEB APPLICATION HOME BUTTON - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-15-2011 |
20110307812 | Creating Task Sessions - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-15-2011 |
20110307880 | DYNAMIC WEB APPLICATION NOTIFICATIONS INCLUDING TASK BAR OVERLAYS - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-15-2011 |
20110307883 | Web Application Pinning Including Task Bar Pinning - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-15-2011 |
20110307946 | Creating and Launching a Web Application with Credentials - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-15-2011 |
20120066634 | BRANDED BROWSER FRAME - In at least some embodiments, a web browser user interface is designed to enable site branding and functionality. Specifically, websites can provide content that can be utilized in a control layout area near the top of the web browser user interface to reinforce branding through the use of color and/or a site-provided icon, termed a “favicon” that serves dual roles as a branding instrumentality and a site's home button. Further, in at least some embodiments, branding can be reinforced through the use of a site-associated color that is utilized for rendering one or more web browser navigation controls. | 03-15-2012 |
20120166956 | PRIVATE PINNING INCLUDING TASK BAR PINNING AND JUMP LIST TASK AND ITEM LAUNCHING - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 06-28-2012 |
20120166959 | SURFACING CONTENT INCLUDING CONTENT ACCESSED FROM JUMP LIST TASKS AND ITEMS - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 06-28-2012 |
20130007371 | Browser Storage Management - Browser storage management techniques are described. In one or more implementations, inputs are received at a computing device that specify maximum aggregate sizes of application and database caches, respectively, of browser storage to be used to locally store data at the computing device. For example, the inputs may be provided using a policy, by an administrator of the computing device, and so on. The maximum aggregate sizes are set of application and database caches, respectively, of browser storage at the computing device to the sizes specified by the inputs. | 01-03-2013 |
20130219383 | Using an Application Cache to Update Resources of Installed Applications - Various embodiments enable installable applications that are to be used on a local client machine to utilize an application cache manifest file that resides remotely, on the web, to define various resources that are to be updated and available offline after the installable application has been deployed on the local client machine Whenever the content of the manifest file is updated on the web, the installed application automatically updates its local application cache resources and allows the installed application to use those resources offline. This is done without having to install a new update of the application or burden the user with having to navigate to a location to obtain the updated content. | 08-22-2013 |
20140189546 | Web Application Pinning Including Task Bar Pinning - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 07-03-2014 |
20140289724 | Dynamic Web Application Notifications Including Task Bar Overlays - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 09-25-2014 |
20140359428 | Web Application Home Button - Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments, client-side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction, and have those boundaries enforced by a run-time engine. In at least some embodiments, developers can provide, through JavaScript code and/or HTML markup, various configurations for the creation of a start menu shortcut, navigation, and so-called jumplist integration. | 12-04-2014 |
20150046519 | PROGRAMMING MODEL FOR SYNCHRONIZING BROWSER CACHES ACROSS DEVICES AND WEB SERVICES - A computer user may use a computing environment comprising a set of computers that respectively feature a web browser having a browser cache containing many types of data objects, including application resources and user-generated data files. However, the contents of a browser cache significantly contribute to the computing environment of a computer, and the computing environments presented by each computer may diverge, providing an inconsistent computing environment. Instead, the contents of browser caches of the computers comprising the computing environment may be synchronized across computers. Additionally, the browser cache may be synchronized with the other data objects of a computing environment (such as relevant portions of the filesystem); the synchronizing may be implemented as an out-of-browser process executing independently of the applications, and even when the browser is not executing; and the synchronization may be exposed through a programmatic access with which web applications may interact. | 02-12-2015 |