Patent application number | Description | Published |
20140013112 | ENCRYPTING FILES WITHIN A CLOUD COMPUTING ENVIRONMENT - A system, computer readable medium and a method for encrypting a file, the method may include retrieving the file from a storage service; segmenting the file into multiple file segments; calculating a file segment signature for each of the multiple file segments to provide multiple file segment signatures; encrypting each of the multiple file segments to provide multiple encrypted file segments by using encryption keys that are in response to the multiple file segment signatures; wherein the multiple encrypted file segments form an encrypted file; and sending the multiple encrypted file segments to the storage service. | 01-09-2014 |
20140019497 | MODIFICATION OF FILES WITHIN A CLOUD COMPUTING ENVIRONMENT - A system, computer readable medium and a method for modifying a file, the method may include: determining, by a management server within a cloud computing environment, to modify the file; retrieving the file from a storage entity that is managed by a first storage service within the cloud computing environment; modifying the file, by the management server, to provide a modified file, wherein the modifying comprises flagging the modified file as to be handled by an agent that is hosted by a device of a user, wherein the agent is arranged to cooperate with a management server; and providing the modified file to at least one storage service. | 01-16-2014 |
20140019498 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR FILE MANAGEMENT - A method for file management, the method may include: calculating, by a management server that is located within a cloud computing environment, signatures of multiple files that are stored at multiple storage entities; and finding, by the management server, groups of similar files out of the multiple files, wherein the finding is in response to similarities between signatures of the multiple files; wherein the multiple storage entities comprise at least a first storage entity that is managed by a first management entity and a second storage entity that is managed by a second management entity that differs from the first management entity. | 01-16-2014 |
Patent application number | Description | Published |
20090183185 | Declarative and Extensible Process Definition - An enterprise application may operate on a platform that is able to execute a solution pack that may have various configurable items incorporated into the solution pack. During runtime, the platform may present the configurable items in a user interface. The items may be embedded within the solution pack, which may contain various descriptors of a business process, including workflow definitions, data types handled in the process, and various rules or other definitions. The options made available within the solution pack may alter the workflow, alter conditions used within the workflow, change data types, or change any other element. The options may also be made available through an application programming interface to the platform. | 07-16-2009 |
20090319576 | EXTENSIBLE TASK EXECUTION TECHNIQUES FOR NETWORK MANAGEMENT - An extensible task execution technique includes receiving a stimulus, matching the stimulus to a given workflow instance, determining parameters applicable to the received stimulus and the given workflow instance, and executing one or more tasks on one or more target devices specified by the given workflow instance and the parameters. | 12-24-2009 |
20140359602 | APPLICATION INSTALL AND LAYOUT SYNCING - Embodiments described herein relate to synchronizing configuration information between devices associated with a user. The synchronized configuration information can relate to application installations and uninstallations as well as to user modifications to user interfaces for managing and invoking the applications. For example, layouts of application representations provided by respective application launchers on a user's respective devices are kept automatically synchronized when the user modifies any of the layouts. Installations and uninstallations are similarly synchronized between the user's devices. Installations and uninstallations that might stem from synchronization may be circumscribed in various ways, such as by allowing the user to specify whether specific applications are to be installed/uninstalled only on specific devices or globally, by filtering propagation of synchronization updates according to hardware or software features and incompatibilities, or others. | 12-04-2014 |
Patent application number | Description | Published |
20130047198 | Policy Based Application Suspension and Termination - In accordance with one or more aspects, an application that is to be suspended on a computing device is identified based on a policy. The policy indicates that applications that are not being used are to be suspended. The application is automatically suspended, and is allowed to remain in memory but not execute while suspended. Additionally, when memory is to be freed one or more suspended applications to terminate are automatically selected based on the policy, and these one or more selected applications are terminated. | 02-21-2013 |
20130067494 | Resuming Applications and/or Exempting Applications from Suspension - Only a particular number of applications on a computing device are active at any given time, with applications that are not active being suspended. A policy is applied to determine when an application is to be suspended. However, an operating system component can have a particular application be exempted from being suspended (e.g., due to an operation being performed by the application). Additionally, an operating system component can have an application that has been suspended resumed (e.g., due to a desire of another application to communicate with the suspended application). | 03-14-2013 |
20130167058 | CLOSING APPLICATIONS - Application closing techniques are described. In one or more implementations, a computing device recognizes an input as involving selection of an application displayed in a display environment by the computing device and subsequent movement of a point of the selection toward an edge of the display environment. Responsive to the recognizing of the input, the selected application is closed by the computing device. | 06-27-2013 |
20130219155 | Pre-installed Application Activation - Pre-installed application activation techniques are described in which live content for applications is activated before user interaction with the applications. Input indicative of an initial log-in of a user to access an operating system is detected. In response, configuration of an account for the user with the operating system may be initiated to set-up a device for first use by the user. During the configuration, notifications are activated through a notification system of the operating system to obtain live content for one or more pre-installed applications on the computing device. The activation occurs before interaction of the user with the pre-installed applications. Live content may then be incorporated with representations of the applications within a user interface for the operating system, such as displaying application tiles having corresponding live content in a start screen presented to the user after completion of the initial set-up. | 08-22-2013 |
20130219409 | POWER EFFICIENT BROKERED COMMUNICATION SUPPORTING NOTIFICATION BLOCKING - A notification service receives messages including various data from application services, and provides notifications including that data to the appropriate computing devices. Each computing device includes a notification system that receives notifications from the notification service and provides those notifications to the appropriate applications on the computing device. If an application is not allowed to run on a computing device, the notification system on the computing device provides an indication to the notification service to block notifications for the application on the computing device. The notification service ceases providing notifications to a computing device targeting applications for which notifications are blocked on the computing device until an indication is received from the computing device to unblock notifications for the application. | 08-22-2013 |
20140359051 | Service-based Backup Data Restoring to Devices - A user of a device has an account with a service that stores copies of common data that is automatically made available to any of the user's devices and also stores copies of device-specific data that is available to the user on particular user-selected devices but is not automatically made available to all of the user's devices. A set of backed up devices can be displayed to the user of a particular device with various information describing the devices to facilitate user selection of a device, such as a visual representation of the type of the device that was backed up, a visual representation of a desktop or start screen display of the device that was backed up, and so forth. The user can select one of the displayed devices, and in response have the backed up device-specific data for the selected device copied to the particular device. | 12-04-2014 |
20140359056 | Metered Network Synchronization - Metered network synchronization techniques are described. A current network connection of a computing device is checked as to whether the current network connection has been identified as a metered network. Access by a synchronization engine of the computing device to communicate via the current network connection to synchronize data of the computing device with another computing device is managed based at least in part on a setting associated with the metered network. | 12-04-2014 |
20140359721 | Live Tiles Without Application-Code Execution - This document describes techniques enabling live tiles without application-code execution. These techniques permit live content to be presented in tiles without executing code of applications associated with those tiles. By so doing, live tiles may be presented more safely, faster, or using fewer resources. | 12-04-2014 |
20150212919 | Policy Based Application Suspension and Termination - In accordance with one or more aspects, an application that is to be suspended on a computing device is identified based on a policy. The policy indicates that applications that are not being used are to be suspended. The application is automatically suspended, and is allowed to remain in memory but not execute while suspended. Additionally, when memory is to be freed one or more suspended applications to terminate are automatically selected based on the policy, and these one or more selected applications are terminated. | 07-30-2015 |