Abstract: A method and apparatus for automatically suggesting further applications to a user using an executed application in a computerized environment, comprising receiving metadata provided by the executed application; searching an index for suggested applications which receive as input the data provided by the executed application; assigning a priority for each of the suggested applications; sorting the suggested applications according to the priority; and displaying to the user a list comprising the applications that received the highest priorities.
Abstract: According to some embodiments, an ordered set of display elements may be determined for a user interface display, each display element being associated with a display value. A dynamic display table may be created for the display page, with each cell in the dynamic display table representing a sub-set of the display elements and containing a total of the display values of the display elements in that sub-set. An overall display value may be determined for the user interface page, and a plurality of cells in the dynamic display table may be evaluated to select an appropriate sub-set of display elements based on the overall display value. It may then be arranged for the selected sub-set of display elements to be presented on the user interface display.
Abstract: A method and apparatus for protecting a remote computer connected through a network to a main computer, by creating a cryptokey on the main computer, supplying the cryptokey to the remote computer and mounting a partition on the remote computer using the cryptokey. The cryptokey is not persistently stored on the remote computer but rather saved in its memory, and the connection of the remote computer to the main computer is periodically tested. Once the remote computer is disconnected, the encrypted partition is unmounted and the cryptokey is erased form the memory, thus disabling access of an attacker to data stored in the encrypted partition. The method incorporates swap partition encryption using a cryptokey created each time during the boot of the remote computer.