Patent classifications
G06F8/62
NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR CAUSING INFORMATION PROCESSING DEVICE TO EXECUTE IMAGE PROCESS, AND INFORMATION PROCESSING DEVICE
An information processing device may read, from a shared storing area, first identification information indicating K pieces of first applications that are already installed. The information processing device may display first screen on the display. The information processing device may cause an operating system to display the K pieces of first images in the first screen. Each of K pieces of link information may be associated with a corresponding one of the K pieces of first images. When any one of the K pieces of first images receives an input operation, the operating system may activate the corresponding first application indicated by the link information associated with the first image that receives the input operation.
Method for managing application and electronic device thereof
A method and an apparatus for managing an application are provided. A method of managing an electronic device includes deleting an application, detecting entering of an icon edit mode, and displaying an icon of the deleted application when in the icon edit mode.
Tenant allocation in multi-tenant software applications
A solution is proposed for managing a multi-tenant software application adapted to serve a plurality of tenants. A deletion request is received for deleting one of the tenants from the plurality of tenants. Responsive to receiving the deletion request, an instance of the software application associated with the tenant to be deleted is disabled. The disabled instance of the software application associated with the tenant to be deleted is deleted after a protection period from the deletion request. An addition request for adding a new tenant to the software application is received. An instance of the software application for the new tenant is allocated to a selected instance of the software application.
APPLICATION PROGRAM UNINSTALLATION METHOD AND APPARATUS
An application program uninstallation method and apparatus relate to the field of communications technologies. The method includes: obtaining current location information of a terminal (101); obtaining effective location information of a first application that is already installed on the terminal, where the effective location information is used for instructing the first application to provide an effective application service when the terminal is within a geographical location range corresponding to the effective location information (102); and uninstalling, by the terminal, the first application when the current location information of the terminal does not match the effective location information of the first application (103). According to the method and the apparatus, an application program is uninstalled when a current location of a terminal does not match an effective geographical location of the application program, so that user operation and control efficiency and terminal usability are improved, and user experience is improved.
CAPTURING AND DEPLOYING APPLICATIONS USING MAXIMAL AND MINIMAL SETS
Systems and methods are described for packaging and deploying applications using minimal and maximal component sets. A minimal set of application components that includes at least the necessary components for launching the application is first downloaded to an endpoint device from a central server. The application is launched on the endpoint from the minimal set. If the application requests a missing component that is not available on the endpoint, the missing component is requested and delivered on-demand from a maximal set located on the server, where the maximal set contains all possible application components. The application is suspended during the download of the missing component. After the missing component is downloaded, the application is resumed, having access to the missing component on the endpoint.
INTELLIGENT EDGE STATE OPTIMIZATION WITHIN ENTERPRISE WITH ZERO DATA EXHAUST
Systems and methods for optimizing application experiences on devices in an enterprise while maintaining privacy compliance are provided. An enterprise model management service of the enterprise accesses, from a centralized software service, a model comprising one or more rules to be applied to an application. The model is provided to devices of a first cohort, whereby a rule of the model causes an action associated with the application to occur at each device. User metrics associated with the action at each device of the first cohort is aggregated. The user metrics indicate a result of the action at each device. The aggregated user metrics are analyzed, whereby the analyzing includes determining a second cohort at the enterprise. The model is then provided to devices of at least a portion of the second cohort. No user metrics are returned to the centralized software service thus maintaining privacy compliance.
METHOD FOR PERFORMING UNIFICATION OF DATA ON COMPUTING DEVICE ACROSS APPLICATION INSTALL-REINSTALL ADHERING TO GDPR
The present disclosure provides a system that performs a method for performing unification of data for identifying a user on computing device after reinstalling the application adhering to GDPR compliance. The method includes a first step of receiving a first set of data associated with the computing device. The method includes another step of mapping the first set of data to a first natural number of a plurality of natural numbers using an increment sequence method. The method includes yet another step of hashing of the first set of data in real-time. The method includes yet another step of assigning a first shard index of a plurality of shard indexes to the first set of data based on the first natural number of the plurality of natural numbers. The method includes yet another step of sending the first shard index of the plurality of shard indexes to the server.
Method and apparatus for managing application
A method of managing an application having a background module is provided. The method includes operations of determining a first background stop time and stopping the execution of the background module of the application during the first background stop time, wherein the first background stop time is a time period between a point of time when execution of the application was stopped and a first point of time.
Systems and methods to protect unified extensible firmware interface protocol serviceability
A method may include, in an information handling system comprising a basic input/output system (BIOS) embodied in non-transitory computer-readable media and configured to be the first code executed by a processor when the information handling system is booted and configured to initialize components of the information handling system into a known state: receiving an indication of installation of a protocol by a producer driver of a plurality of protocol drivers integral to the BIOS, storing metadata regarding the protocol in a protocol database of the BIOS, receiving a request to consume the protocol by a consumer driver of the plurality of protocol drivers, and obfuscating the metadata stored in the protocol database from the consumer driver to prevent the consumer driver from uninstalling the protocol.
MANAGING LIFECYCLE OF AGENTS OF CLOUD SERVICES ACCORDING TO DESIRED STATE
A method of managing lifecycle of agents of cloud services running in a customer environment according to a desired state of the agents includes comparing a running state of the agents against the desired state. Upon determining that the running state includes a first agent that is not present in the desired state, the first agent is removed. Upon determining that the desired state includes a second agent that is not present in the running state, the second agent is deployed. Upon determining that there is a drift in the running state of a third agent from the desired state of the third agent, the third agent of the desired state is deployed while the third agent of the running state continues execution. The third agent of the running state is removed after the third agent of the desired state executes without errors for a period of time.