Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35 results about "Drive mapping" patented technology

Drive mapping is how operating systems, such as Microsoft Windows, associate a local drive letter (A through Z) with a shared storage area to another computer (often referred as a File Server) over a network. After a drive has been mapped, a software application on a client's computer can read and write files from the shared storage area by accessing that drive, just as if that drive represented a local physical hard disk drive.

Method and apparatus to manage network client logon scripts using a graphical management and administration tool

A GUI (Graphical User Interface) Manager is used by a network administrator to fill-in predefined templates. The administrator does not need to compile, debug or write a single line of scripting code. The GUI manager has a “select the box” and “point and click” and “fill-in the blank” approach for selecting computer settings. The predefined configuration and/or template(s) are used by a logon script program on a client system to manage the configuration of resources on at least one client. There are three levels of resources that can be managed. The first type of resource is an operating system. The second type of resource is an application resource. And the third type of resource is to redirect a resource on the client to a resource on a network such as a drive letter mapping. Resources include configurations from the group of configuration settings consisting of drive mappings, shell folders, printer deployment, proxy server access, application paths, service packs, anti-virus updates, policies and automatic mail profile creation. In another embodiment, validation logic is used on the clients' system during the execution of an application program that takes the template and applies the defined configuration settings in the template to the clients' system so as to automatically configure at least one configuration setting for a user if the combination of one or more predefined conditions for a selected group, a selected operating system and a selected connection method are met. In still another embodiment, an interpretive engine is used on the client's system to permit the administration of client resources with a template while also allowing network administrators to build their own custom logon scripts.
Owner:QUEST SOFTWARE INC

Managing client configuration settings in a network environment

A GUI (Graphical User Interface) Manager is used by a network administrator to fill-in predefined templates. The administrator does not need to compile, debug or write a single line of scripting code. The GUI manager has a “select the box” and “point and click” and “fill-in the blank” approach for selecting computer settings. The predefined configuration and / or template(s) are used by a logon script program on a client system to manage the configuration of resources on at least one client. There are three levels of resources that can be managed. The first type of resource is an operating system. The second type of resource is an application resource. And the third type of resource is to redirect a resource on the client to a resource on a network such as a drive letter mapping. Resources include configurations from the group of configuration settings consisting of drive mappings, shell folders, printer deployment, proxy server access, application paths, service packs, anti-virus updates, policies and automatic mail profile creation. In another embodiment, validation logic is used on the clients' system during the execution of an application program that takes the template and applies the defined configuration settings in the template to the clients' system so as to automatically configure at least one configuration setting for a user if the combination of one or more predefined conditions for a selected group, a selected operating system and a selected connection method are met. In still another embodiment, an interpretive engine is used on the client's system to permit the administration of client resources with a template while also allowing network administrators to build their own custom logon scripts.
Owner:QUEST SOFTWARE INC

Subscriber's line information managing system for telecommunication service platform

InactiveCN1658633AReasonable and fast business processing abilitySpecial service for subscribersDrive mappingIp address
A digital telephone station including several telephone stations, the two computer backup of the connect server, the two computer backup of the applied server, the two network backup and the two electrical source backup. The two network backup is that insert two network cards on each equipment, tie the two network cards together in the interleaving way through software, assign one network IP address, other equipments call on the computer by the IP as the identification. When a passage can't work, it automatically switches onto the other passage. The two computer backup of the connect server uses two independent connect servers, besides it adds the system state monitor module. The two computer backup of the applied server uses the hardware to collocate the disk array, and has the information exchange communications through the software isochronous module. The connect server adopts the SS7 information order to connect in. It uses the DOP keyboard driving mapping technology, and catches the burst signal of the DOP special disk, then maps it onto the standard 101 keyboard. This invention mainly solves the technology problem that the present telephone station can only adapted to the S1240E series hub and can't work after the hub is upgraded.
Owner:上海阿尔卡特网络支援系统有限公司

General continuous data protection method, device and electronic equipment

ActiveCN112540872BCompatible with reading and writing requirementsRead and write needs are metInput/output to record carriersRedundant operation error correctionDrive mappingEngineering
The present invention relates to the technical field of data backup, in particular to a general continuous data protection method, device and electronic equipment, the method includes receiving at least one data read and write request of the storage application by using a storage protocol corresponding to the storage application; based on the storage protocol The mapping relationship with the storage driver determines the storage object corresponding to each of the data read and write requests, and the storage object corresponds to the storage driver; according to each of the read and write requests, perform read and write operations on the determined storage object. Locally integrates at least one storage protocol corresponding to a storage application. Using the correspondence between storage applications and storage protocols, it can be compatible with the read and write requirements of various storage applications; and also integrates the mapping relationship between storage protocols and storage drivers. Using the mapping relationship, at least one storage driver for storing objects can be locally integrated, so that the storage requirements of at least one storage application can be met without additional deployment of continuous data protection.
Owner:WUXI CHINAC DATA TECH SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products