Patent classifications
H04L41/18
Security system with networked touchscreen
Methods and systems for monitoring a premises are described. A computing device may receive data from a premises management system. The computing device determines one or more actions to perform by analyzing the data. The computing device may determine to output, via a user interface, an indication associated with the data. A user may request video associated with the data.
Security system with networked touchscreen
Methods and systems for monitoring a premises are described. A computing device may receive data from a premises management system. The computing device determines one or more actions to perform by analyzing the data. The computing device may determine to output, via a user interface, an indication associated with the data. A user may request video associated with the data.
RECOMMEND TARGET SYSTEMS FOR OPERATOR TO ATTENTION IN MONITOR TOOL
An approach is provided in which the approach captures a first user activity log of a first user accessing multiple systems and captures a set of second user activity logs of a set of second users accessing the multiple systems. The approach determines a set of system monitoring preferences based the first user activity log and the set of second user activity logs, and scores the multiple systems based on the set of system monitoring preferences. The approach generates a recommended system monitoring list based on the scored multiple systems, and transmits the recommended system monitoring list to the first user.
RECOMMEND TARGET SYSTEMS FOR OPERATOR TO ATTENTION IN MONITOR TOOL
An approach is provided in which the approach captures a first user activity log of a first user accessing multiple systems and captures a set of second user activity logs of a set of second users accessing the multiple systems. The approach determines a set of system monitoring preferences based the first user activity log and the set of second user activity logs, and scores the multiple systems based on the set of system monitoring preferences. The approach generates a recommended system monitoring list based on the scored multiple systems, and transmits the recommended system monitoring list to the first user.
System, method, apparatus, and computer program product for providing mobile device support services
A method is provided for providing mobile device support services. The method may include monitoring a mobile device status. The method may additionally include performing device diagnostics based at least in part on captured deice status data to identify potential faults that may affect mobile device functionality. A corresponding system, apparatus, and computer program product are also provided.
Virtual systems management
An apparatus and method for automatic configuration management of a network are provided. The apparatus and method may provide a virtualization system that has an inventory that includes physical resources and virtual assets managed by a virtualization layer running on the physical resources; wherein virtual assets are software instantiations of computer systems, receive a virtual asset provisioning request that specifies parameters to be considered for the virtual asset provisioning request and receive data on inventory available in the virtualization system. The apparatus and method may automatically provision a particular virtual asset to a particular physical resource in the virtualization system that matches the parameters in the virtual asset provisioning request, assign the provisioned virtual asset to the virtual asset provisioning request and provide user access to the provisioned virtual asset.
Illicit route viewing system and method of operation
A route viewing system includes a computing system that receives information associated with one or more routes through a network, and identifies the routes that are associated with at least one illicit user computer used by an illicit user. The computing system then obtains a source location of a source address of the routes and a destination location of a destination address of the routes, and displays the routes on a geographical display at the source location of the source address and the destination location of the destination address of each of the routes.
Illicit route viewing system and method of operation
A route viewing system includes a computing system that receives information associated with one or more routes through a network, and identifies the routes that are associated with at least one illicit user computer used by an illicit user. The computing system then obtains a source location of a source address of the routes and a destination location of a destination address of the routes, and displays the routes on a geographical display at the source location of the source address and the destination location of the destination address of each of the routes.
METHOD AND SYSTEM FOR NETWORK OPPORTUNITY DISCOVERY BASED ON SUBSCRIPTION AND HARDWARE VISIBILITY
One example method includes various processes performed by a vendor system including discovering infrastructure assets of a subscriber system, determining that the vendor system is permitted by the subscriber system to access information about the infrastructure assets of the subscriber system, accessing the information about the infrastructure assets of the subscriber system, assessing an ability of the infrastructure assets of the subscriber system to implement a service offering of the vendor system, and the assessing is based on the information about the infrastructure assets, and implementing the service offering in the infrastructure assets of the subscriber system when (i) given permission to do so by the subscriber system and (ii) the infrastructure assets have been determined to be able to implement the service offering.
METHOD AND SYSTEM FOR NETWORK OPPORTUNITY DISCOVERY BASED ON SUBSCRIPTION AND HARDWARE VISIBILITY
One example method includes various processes performed by a vendor system including discovering infrastructure assets of a subscriber system, determining that the vendor system is permitted by the subscriber system to access information about the infrastructure assets of the subscriber system, accessing the information about the infrastructure assets of the subscriber system, assessing an ability of the infrastructure assets of the subscriber system to implement a service offering of the vendor system, and the assessing is based on the information about the infrastructure assets, and implementing the service offering in the infrastructure assets of the subscriber system when (i) given permission to do so by the subscriber system and (ii) the infrastructure assets have been determined to be able to implement the service offering.