Abstract: Computer networks can have excessively varied configurations, hence the ability to easily discover and access services within a networked computing environment has become indispensable to modern business. As a result, systems such as ZeroConfiguration (ZeroConfig) have been introduced to make services such as printing more seamless. ZeroConfig enables a service (such as a printing service) to be discovered in a straightforward manner to user devices wishing to use the service without any configuration on the part of a user or administrator. While this is advantageous in some environments, in others, service visibility becomes too widespread. Hence, a system and method is provided for controlled visibility service discovery and subsequent service execution. The system and method allow only authorized users to discover services from their user device using ZeroConfig as the underlying technology. In this way benefits of systems such as ZeroConfig can be maintained while providing service visibility control.
Abstract: Computer networks can have excessively varied configurations, hence the ability to easily discover and access services within a networked computing environment has become indispensable to modern business. As a result, systems such as ZeroConfiguration (ZeroConfig) have been introduced to make services such as printing more seamless. ZeroConfig enables a service (such as a printing service) to be discovered in a straightforward manner to user devices wishing to use the service without any configuration on the part of a user or administrator. While this is advantageous in some environments, in others, service visibility becomes too widespread. Hence, a system and method is provided for controlled visibility service discovery and subsequent service execution. The system and method allow only authorized users to discover services from their user device using ZeroConfig as the underlying technology. In this way benefits of systems such as ZeroConfig can be maintained while providing service visibility control.
Abstract: A thorough method for restricting which operations (processes) can be run by a user on a single workstation computer or by a user on a session in a multi-user environment, such as Microsoft Windows 2000 Terminal Services. By default, all applications (processes) are disallowed. Only explicitly assigned applications (processes) are allowed to run. The method entails running two software modules in user mode, one of which maintains a list of allowed processes for each user and one of which monitors new processes as they are started. When a new process is started the monitoring module sends the process ID to the list module. The list module checks the ID against its list and kills the process if it is not authorized. This way, only processes created by users are validated as apposed to validating all file I/O (processor intensive). This decreases the processing requirements.
Abstract: The invention provides for a method of optimizing the scheduling of program threads within an operating system based on quality objectives, and a system implementing said method.
Abstract: A protocol, or method, for managing the printers and printer connections for users on a computer network based on the user's group membership, user name, terminal name (client name) and computer name. Network administrators can centrally manage the assignment of user's printers and network printer connections on any networked computer system, including Microsoft Windows NT Terminal Server Edition. Installation of required drivers is dynamic with no interaction with the user.