Patent classifications
H04L67/34
Verification of computer system prior to and subsequent to computer program installation
Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains. Thereafter, administrative network privileges to access the multiple different network domains are acquired and existing resources in the computing environment are identified. Additionally, a signature file is loaded into a memory of the computer, where the signature file denotes infrastructure requirements of the computing environment, and the existing resources and the infrastructure requirements denoted in the signature file are compared to determine whether a disparity exists between the existing resources and the infrastructure requirements. Upon determining that the disparity exists between the existing resources and the infrastructure requirements a configuration of the computing environment of the multiple different computing devices is adjusted to fix the disparity.
Enterprise application store for an orchestration framework for connected devices
Aspects described herein allow multiple devices to function as a coherent whole, allowing each device to take on distinct functions that are complementary to one another. Aspects described herein also allow the devices function as a coherent whole when interconnected devices and their respective applications are configured to operate in various operation modes, when management policies are employed to control the operation of the interconnected devices and their respective applications, when transferring content between the interconnected devices and storing the content at those devices, when obtaining access credentials for the interconnected devices that enable the devices to access enterprise resources, when a policy agent applies management policies to control operation of and interaction between the interconnected devices, and when the interconnected devices are used to access an enterprise application store.
Context-driven local network services
Various embodiments are generally directed to cooperation among networked devices to obtain and use a multiple-frame screenshot. In one embodiment, an apparatus comprises a processor circuit executing a sequence causing the processor circuit to receive a signal conveying a context data; retrieve an aspect of a current context of the apparatus; compare the aspect to the context data; determine whether a context defined as appropriate exists to engage in interactions with one or more other computing devices through a network based on the comparison, the interactions comprising providing a network service to the one or more other computing devices; and engage in the interactions with one or more computing devices through the network when the appropriate context to engage in the interactions exists. Other embodiments are described and claimed herein.
Service pool for multi-tenant applications
A processing device receives a request from a client for a specific service. Responsive to determining that the specific service is not running, the processing device converts a previously instantiated generic service into the specific service. To perform the conversion, the processing device assigns the generic service from a service pool for the specific service and renames the generic service based on a name of the specific service. The processing device additionally queries a directory service for specific service logic associated with the specific service. The processing device receives at least one of the specific service logic or a reference to the specific service logic from the directory service, and updates the generic service to include at least one of the specific service logic or the reference to the specific service logic.
Method and apparatus for handling application triggering events
A system comprises a processor configured to subscribe to a broadcast of vehicle-related state changes. The processor is also configured to detect at least one vehicle-related state change in the broadcast that triggers an application launch and launch an application corresponding to the detected vehicle related state change.
Automated password generation and change
An identity management system detects the occurrence of a trigger event, such as a time period expiration, or an action on the identity management system. The identity management system accordingly generates a new password for an account of a user on a third-party service and causes the account of the user on the third-party service to use the new password. The identity management system may also a mobile device management system to configure a client of the user with the new password.
Single input graphical user interface control element and method
Described are methods, systems and computer readable media for GUI control elements and associated processing methods.
Internet-of-things device blank
System and techniques for an internet-of-things device blank are described herein. An IoT blank device may be tested to determine whether it is in an initial state. In response to a determination that the IoT blank device is in the initial state, a cloud endpoint may be contacted, via a transceiver, to retrieve a package. Here, the contact includes a message with an identifier of the IoT blank device. The package may be received, the package including an application. The package may be installed. The installation including registering the application with a message queue of the IoT blank device. The application may also be run after installation. Data from the application running on the IoT blank device may be received via a message queue. The data may then be transmitted to the cloud endpoint via the transceiver of the IoT blank device.
Media client device setup utilizing zero-touch installation
A device may receive and store first device information (first information), associated with a media client device (media client), and a first security key (a first key) from a content provider network (CPN); and may receive a provisioning request from the media client, including second device information (second information), based on the media client detecting an absence of a physical network connection to receive media content. The device may compare the first information and the second information and may request a second security key (a second key) based on the first information matching the second information. The device may receive the second key from the media client and may compare the first key and the second key. The device may enable the media client to establish a secure connection to the CPN, via a network associated with the device, based on the first key matching the second key.
Vehicle device
A vehicle system includes: a reprogramming slave device that is an electronic control unit (hereinafter, referred to as ECU) to be a target of updating an update file of a program stored among a plurality of the ECUs; a reprogramming master device that transmits the update file to the reprogramming slave device in response to a request from a terminal operable by a vehicle user to control updating of the program stored in the reprogramming slave device; and a determination unit that determines traveling propriety of a vehicle when the update file is rewritten in the reprogramming slave device. The vehicle device functions as the reprogramming master device, and includes: an obtaining unit that obtains the traveling propriety determined by the determination unit; and a notification command unit that commands a notification medium to notify information of the traveling propriety obtained by the obtaining unit.