G06F9/44505

Remote management of application settings

In various implementations, a computer-implemented method for remotely managing settings of applications includes receiving a network communication from a managed device, the received network communication including a client-side hash value. The method further includes identifying settings for an application on the managed device in response to the receiving of the network communication, where the identified settings include configuration instructions for the application. Based on a comparison between the received client-side hash value and a server-side hash value that corresponds to the identified settings, at least some of the identified settings are transmitted to the managed device. The transmitting of at least some of the identified settings can be based on the comparison indicating a mismatch between the received client-side hash value and the server-side hash value. The method may also include completing processing of the received network communication after the transmitting of the at least some of the identified settings.

Optimization of configurable distributed computing systems

The subject matter of this specification can be implemented in, among other things, a method that includes accessing a plurality of target tasks for a computing system, the computing system comprising a plurality of resources, wherein the plurality of resources comprises a first server and a second server, accessing a plurality of configurations of the computing system, wherein each of the plurality of configurations identifies one or more resources of the plurality of resources to perform the respective target task of the plurality of target tasks, and performing, for each of the plurality of configurations, a simulation to determine a plurality of performance metrics, wherein each of the plurality of performance metrics predicts performance of at least one of the plurality of resources executing the plurality of target tasks on the computing system.

APPLICATION UPDATES
20180011771 · 2018-01-11 ·

Described herein are example systems and computer-implemented methods for monitoring changes to an application. For example, information regarding a change made to an aspect of an application may be received by a processor. It, may be determined if a similarity of the change to a cluster of changes related to the aspect is within a change threshold. Further, the change may be associated with the cluster of changes when the similarity of the change is within the change threshold. It may be further determined if a metric based on a number of changes associated with the cluster of changes is within a cluster range. When the metric within the cluster range, a prototype change may be extracted from the cluster of changes. The application may be updated based on the prototype change when the metric is within the cluster range.

PROGRAM ACQUISITION METHOD, AND INFORMATION PROCESSING TERMINAL

A program acquisition method performed by an information processing terminal, includes calculating a degree of matching a first condition that authorizes access to a predetermined program with respect to a condition detected in relation to the information processing terminal, acquiring the predetermined program and storing the acquired predetermined program in a storage in response to the degree of matching being within a predetermined range from a first value indicating that the degree of matching satisfies the first condition, and restricting the access to the predetermined program stored in the storage until the degree of matching indicates the first value.

System and method for implementing a one to many configuration management tool

The invention relates generally to a system and method for implementing a one to many configuration management tool using runtime injection to replace hard coded values. An embodiment of the present invention is directed to addressing configuration management challenges, enhancing software quality and improving operation performance.

Configuration management based on thermal state

The systems and methods manage thermal states of a device through user configuration of a client application on the device. The systems and methods set thermal thresholds associated with the device. The systems and methods infer the thermal thresholds from information gathered by a client application running on the device. The systems and methods implement a stored policy associated with a violation of one of the thermal thresholds by one of the monitored thermal states.

Look-up table initialize

A digital data processor includes an instruction memory storing instructions specifying a data processing operation and a data operand field, an instruction decoder coupled to the instruction memory for recalling instructions from the instruction memory and determining the operation and the data operand, and an operational unit coupled to a data register file and to an instruction decoder to perform a data processing operation upon an operand corresponding to an instruction decoded by the instruction decoder and storing results of the data processing operation. The operational unit is configured to perform a table write in response to a look up table initialization instruction by duplicating at least one data element from a source data register to create duplicated data elements, and writing the duplicated data elements to a specified location in a specified number of at least one table and a corresponding location in at least one other table.

Dynamically mapping software infrastructure utilization

A computer-based system and method for real-time monitoring of computer resource usage, including obtaining, by a monitoring application executed by a processor, from a plurality of applications, each application executed by a processor, a report upon the accessing of at least one accessed resource by at least one accessing user; and generating, by the monitoring application based on the report, a map of resources accessed by the plurality of applications. If a notification that a resource has been compromised is obtained, a list of all applications that have accessed the resource may be generated based on the map.

REMOTE FEATURE ACTIVATION IN POWER MACHINES

Implementations of the present disclosure are generally directed to activating features in power machines. More particularly, implementations of the present disclosure are directed to remote activation of features in power machines. Implementations include, methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting a request for an initialization indicator for a software package from an initialization system of a power machine comprising hardware physically capable of executing at least one function, the request being transmitted, by a communication link of the initialization system, from a machine controller of the initialization system to a remote system, communicating, by the communication link, the initialization indicator from the remote system to the machine controller, and in response to receiving the initialization indicator: storing, by the machine controller, the initialization indicator, and executing, by the machine controller, the software package to control the at least one function.

CONFIGURATION TECHNIQUES FOR MANAGED HOST OPERATING SYSTEMS AND CONTAINERIZED APPLICATIONS INSTANTIATED THEREBY

Embodiments described herein are directed to configuring managed computing devices utilizing containerized applications. For instance, a mobile device manager may provide configuration settings to a computing device via, for example, an enterprise network. A host operating system (OS) executing on the computing device determines and applies the settings that are applicable to the host OS. The configuration settings are stored for configuring containerized applications executing on the computing device. For instance, as new containerized applications are launched by the host OS, the containerized applications retrieve the configuration settings and determine and apply the settings that are applicable to the containerized applications. Results of applying the configuration settings to the host OS and the containerized applications are merged and sent to the mobile device manager. The host OS and the containerized application may, for example, implement the settings in order to be compliant with an enterprise's policy.