In many environments, a single computer user has multiple computing devices he or she uses to perform computing tasks. For example, a corporate employee may have a work computer, a home computer, and a laptop computer. Each of these computer systems may be in and/or may move between different physical locations. However, the employee may desire uniform access to work related applications and work related data from any of his or her computer systems without regard to location. The computer user may also have a computing device with multiple operating systems installed in different partitions. The computer user may desire uniform access to applications running on all of the operating systems without switching interfaces.
Installing the same applications on all of the employee's computing devices can provide a common look and feel across all the computer systems. Installing the same applications on all the employee's computing devices can also provide access to corporate applications and corporate data in a uniform fashion across all of the computing devices. However, installing the same applications on multiple computing devices also has a number of drawbacks such as increased cost and limited central control over non-managed computing devices.
Since users understand and know how to launch resources on their local computers, administrators can ease the burden of accessing remote resources by pushing the resources and settings out to the local computers. However, this is only practical if both the host and local computers are in the same domain (e.g., Active Directory® domain (Microsoft Corporation, Redmond, Wash.)). Additionally, anything a user has to install locally means that the administrator has lost control of patching the resources or upgrading the application without the help of the user installing an additional package. Therefore, methods and systems that provide seamless and uniform access to non-local resources would have considerable utility.
Techniques for discovering, connecting to, disconnecting from, reconnecting to, updating, removing, and other management of workspaces are described. A “workspace” is a collection of resources (local and/or remote of different types including types running on different operating systems) that a user can discover and use. Generally, implementations in accordance with the present disclosure allow a user to discover and manage workspaces from a user device such as a non-managed personal computer. Disclosed embodiments allow intuitive access to resources contained within a workspace by allowing those resources to behave like a locally-installed resource. One example of that behavior is the ability of remote applications to become the default application for launching local files.
After a user device discovers workspaces, the user device maintains a list of the discovered workspaces. Each of the workspaces contains resources, and shortcuts corresponding to those resources are integrated into a user interface (UI) of the user device (e.g., in a Start-Menu or on a Desktop). The user device receives a request from a user to access one of the workspace resources. In response to receiving that request, a connection is opened from the user device to the resource hosts containing the workspace. This connection enables access from the user device to the resources stored on the resource hosts by allowing a user to interact with the shortcuts and thus interact with the resources in the discovered workspaces. This interaction is similar to an interaction with local resources because the shortcuts appear integrated into the UI of the user device.
A client operating on the user device receives a locator (typically from the user) directing the client to a workspace feed server. The client looks to the workspace specified by the locator and queries that workspace feed server for resources stored on the resource hosts associated with the workspace. The client then creates shortcuts on the user device corresponding to those resources. The client also stores a description of the workspace on the user device. The client may also define management options unique to the specific workspace. The description is not the workspace itself; it is information about the workspace including a unique name of the workspace, the locator of the workspace, a list of the resources associated with the workspace, and a time of most recent update of the description of the workspace. The client also automatically integrates the shortcuts into the UI of the user device so that the UI presents the resources from the workspace as though they were local resources.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The detailed description is described with reference to the accompanying figures. In the figures, the use of the same reference numbers in different figures indicates similar or identical items. These drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope.
Existing options to discover and manage remote resources (e.g., applications, computers, websites, and/or files) from any non-managed computer (such as a user's home computer) are not intuitive and require the user to know and provide complex information. If the local computers are in a different domain than the corporation (i.e., non-managed desktops) there are only a few imperfect options such as terminal servers and/or remote desktop access to provide access to applications and data. A terminal server is a computer system that maintains applications that can be remotely executed by client computer systems. A remote desktop allows remote access (e.g., from home) directly to a desktop computer in another location (e.g., in the office) through a Virtual Private Network (“VPN”), over a terminal server (“TS”) Gateway, or other system.
Accessing a terminal server via a terminal server web access (TSWA) web page published by the administrator is not entirely intuitive. TSWA requires a user of client computer system to direct a web browser to a web site presented by a web server that lists available remote application links (and potentially other content). The information needed to access an application through a remote desktop is also complex (e.g., computer name, Internet protocol address, and/or gateway settings). Solutions such as TSWA provide the administrator with the ability to manage the resources. However, they are limited in other ways, such as the inability to double click on a local file and automatically launch the remote application. There is no way for the user to choose to make a remote program the default file handler for a local file.
However, for a client computer system to access a remote application from a remote desktop (either at a terminal server or another desktop computer), the client computer system must be provided with a link from the administrator (e.g., computer name, Internet protocol address, gateway setting, and/or remote application initiation instructions in an RDP file) for accessing the remote application. Thus, even when using remote desktops, a user or administrator may be required to manually install a link for any remote applications a client computer system is to access.
Techniques for accessing and interacting with a collection of files, applications, and/or other resources grouped into a workspace are disclosed herein. Generally, embodiments of methods and computer readable media in accordance with the present disclosure advantageously provide an ability to discover and use remote resources that behave much like locally-installed resources. Behavior like locally-installed resources includes presence on the local UI similar to local resources (e.g., remote applications in the same menu as local application; remote printers in the same folder as local printers), clipboard access for remote resources, and toolbar integration. In addition, such embodiments allow the remote resources to be accessed from any computer connected to the appropriate network (such as the Internet). If the remote resources are centrally located, an administrator may efficiently add, remove and/or update the contents of a workspace. By grouping logically related resources into a workspace (e.g., resources for the human resources department of the fictitious Contoso Corporation) a user is better able to do things such as locate resources relevant to a given task, know that he or she has located all the relevant resources, and know that access to the resources is closed by closing the workspace.
Configuration of Workspaces
The host servers 114 may include terminal servers, directories, directory services (e.g., Active Directory®), centralized publishing sources, or any other suitable hosts or sources. In some embodiments the remote computer 122 is itself a resource providing a remote desktop. The virtual machine 120, while not physically remote from the user device 106, is a virtual machine host that can provide resources such as resource 116A and resource 116B to the workspace 112. Physically remote devices such as the remote computer 122 and the host servers 114 may be identified as remote resource hosts. The resources 116 may include, for example, an icon 116A, a remote application 116C, a remote file 116D, a RDP file 116E, other software programs, data compilations, desktops, documents, and/or any other suitable resources. A given resource host may have some resources included in the workspace 112, such as resource 116E on host server 114B, and other resources excluded from the workspace 112, such as resource 118.
Shortcuts displayed on a UI 102 of user device 106 may correspond to local or remote resources. For example, shortcut 104C corresponds to remote application 116C on host server 114A. Shortcut 104 corresponds to a local resource. A user (not shown) may launch selected resources by clicking on the corresponding shortcuts 104C or 104, thus allowing the user to use a remote resource much like a locally-installed resource. The icon used to represent a particular shortcut may be supplied from the workspace rather than from an operating system or other software on the user device 106. For example, icon 116A on may be used to represent a shortcut (not shown) on the UI 102 corresponding to resource 116B.
Information sufficient to enable the user device 106 to access and manage resources 116 is provided from the workspace 112 to the user device 106 as a workspace feed 124. In some embodiments the workspace feed 124 is streamed from the workspace 112 to the user device 106. The workspace feed 124 may, for example, be an extensible markup language (XML) file. In some embodiments one workspace 112 is described by one workspace feed 124. The resources 116 in the workspace 112 are remote from the user device 106, but a description of the workspace 108 is stored on the user device 106. The description 108 provides information about the workspace 112 to enable the user device 106 to interact with the resources 116 of the workspace 112. In some embodiments the description 108 is provided by the workspace feed 124. This description is discussed in greater detail with reference to
The user device 106 also stores a list of discovered workspaces 110. Discovering a workspace includes locating the workspace on a network (e.g., searching at a particular IP address and/or URL on the network), storing a description of the workspace 108 on the user device 106, and adding the workspace to a list of discovered workspaces 110. The list of discovered workspaces may be stored on the user device 106. Since a user device 106 may discover and interact with multiple workspaces, a list of discovered workspaces 110 assists with organization and management of the workspaces. The multiple workspaces may be available on a user device simultaneously or at different times. When a user device accesses multiple workspaces, organizing resources into workspaces provides the further advantage of allowing a user to readily know the source of a given resource. This is beneficial if, for example, a person with multiple employers is editing a confidential document for employer “A” and the respective workspaces for each employer include a word processing application. In this situation it is necessary to identify which word processing application is provided by employer “A.”
As explained with reference to
Communication between the client 208 and the network 212 as well as communication between the network 212 and one or more host servers 114 or remote computers 122 may be a secure hypertext transfer protocol secure socket layer (https) connection 206. In some embodiments, the https connection transmits a small text file as a token that serves to identify the user (i.e., a cookie 210) between the user device 106 and the resource hosts. Access to a workspace may require the user to enter credentials such as a username and password. The use of a cookie 210 allows the credentials to be stored so that a workspace may be repeatedly accessed without re-entering credentials. In one embodiment, the user device 106 is in a different domain 202 than the domain 204 of the host servers 114 and the remote computer 122. Alternatively, each host server 114 and/or the remote computer 122 may be in different domains from each other (not shown). In other embodiments (not shown), the user device 106 may be in the same domain as any or all of the host servers and remote computers. Alternatively, the user device 106 and the host servers 114 may be non-domain-joined computers for example computers connected through an un-managed home network (not shown).
In operation, the components of the client 208 may cooperatively obtain the data (resources) regarding the workspace 112, including communicating with the web server 302 to obtain a list of resources, and presenting the data in a UI 102 (e.g., displaying the icons and/or RDP files). In alternative embodiments, (such as that shown in
As further shown in
The user device 106 may also contain communication connection(s) 420 that allow the device to communicate with other computing device(s) 422, such as over a network, for example the network 212 shown in
Various modules and techniques may be described herein in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, and so forth for performing particular tasks or implementing particular abstract data types. These program modules and the like may be executed as native code or may be downloaded and executed, such as in a virtual machine or other just-in-time compilation execution environment. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments. An implementation of these modules and techniques may be stored on or transmitted across some form of computer readable media.
Use of Workspaces
The view 800 of
Because a list of resources 428 file may describe dozens or even hundreds of available resources, such an auto-synchronization mechanism may require significant resource overhead for both the user device 106 and the web server 302 or host servers 114. Since most published resources will remain the same for long periods of time, it may be possible to significantly reduce the overhead burden associated with such synchronization activities by providing timestamp information for each resource 116 in a workspace 112. The timestamp information for each of the available resources enables the user device 106 to determine whether each of the available resources has been modified from a previously-available resource version. In some embodiments, this allows the client 208 to analyze the timestamp information and download supplementary files (such as RDP files and icons) for resources that have changed. This synchronization mechanism may require each resource to undergo some processing at each synchronization, and may require the user device 106 to retain some data for each remote resource (e.g., in the form of a “most recent update” time value). The processing may include parsing of the resource to update the presentation to the user, creating new aggregations of resources, changing the association of the resources to different agents.
Connection status of workspaces may be presented to the user in multiple ways. In some embodiments, a list of connected workspaces may be presented in a view 900 such as the view shown in
Process 1000 continues by maintaining a list of discovered workspaces at 1014 on the user device 106. This list may be the same as the list of discovered workspaces 110 discussed above. Once discovered, the shortcuts and description of the workspace remain on the user device until the workspace is removed. Thus, even if a workspace is closed (but not removed) it remains in a list of discovered workspaces (at 1014). Next, the process 1000 dynamically integrates shortcuts for resources corresponding to each respective one of the discovered workspaces in a UI of the user device 106 (at 1016). This integration allows remote resources to show up like local resources on the user device 106 without requiring any “installer” technology. Integration without an “installer” allows the integration of the remote resources into the UI to dynamically change as the workspace changes. For example, a change in the name of a resource at the resource host can be dynamically reflected by a change in the label of a UI-integrated icon representing that resource. At this point the workspace 112 is fully discovered and a user of the user device 106 may connect to the workspace 112 (at 1018) or disconnect from the workspace (at 1020). Connection and disconnection are discussed in more detail in
A user may disconnect from a connected workspace by making a request to disconnect (at 1112). In one embodiment, at 1116, the request is passage of a defined period of time after all the resources contained in a workspace have been closed. In another embodiment, at 1114, the request is an explicit disconnect command such as the explicit disconnect command 902 shown on
Closing the connection to the resource hosts causes the user device 106 to close its connection to the resources contained in those resource hosts (again at 1118). At 1120, the process 1100 generates a confirmation that the connection is closed as discussed above. Although the connection is closed, the workspace 112 is not removed, and shortcuts for resources 104C corresponding to the closed workspace are maintained on the UI 102 of the user device 106 (at 1122). In one embodiment, the remote resources 506 shown in
The workspace is closed from the perspective of a user of the user device 106; however, the resources remain in an active state on the resource hosts (at 1126). The user can disconnect an entire workspace session and is later able to re-connect to a single application (returning to its state when it was disconnected) as well as to re-connect to the entire workspace session. Process 1100, reconnects to the resources in the same state as at the time of a previous disconnection (at 1128).
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. It will be appreciated that, based on the teachings of the present disclosure, a variety of alternate embodiments may be conceived, and that the present disclosure is not limited to the particular embodiments described herein and shown in the accompanying figures. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claims.
Number | Name | Date | Kind |
---|---|---|---|
5220674 | Morgan et al. | Jun 1993 | A |
5682478 | Watson et al. | Oct 1997 | A |
5764887 | Kells et al. | Jun 1998 | A |
5790853 | Nomura et al. | Aug 1998 | A |
5815574 | Fortinsky | Sep 1998 | A |
5884046 | Antonov | Mar 1999 | A |
5949975 | Batty et al. | Sep 1999 | A |
6049828 | Dev et al. | Apr 2000 | A |
6154787 | Urevig et al. | Nov 2000 | A |
6167445 | Gai et al. | Dec 2000 | A |
6310889 | Parsons et al. | Oct 2001 | B1 |
6452692 | Yacoub | Sep 2002 | B1 |
6463454 | Lumelsky et al. | Oct 2002 | B1 |
6463459 | Orr et al. | Oct 2002 | B1 |
6470384 | O'Brien et al. | Oct 2002 | B1 |
6473794 | Guheen et al. | Oct 2002 | B1 |
6510523 | Perlman et al. | Jan 2003 | B1 |
6519571 | Guheen et al. | Feb 2003 | B1 |
6536037 | Guheen et al. | Mar 2003 | B1 |
6552813 | Yacoub | Apr 2003 | B2 |
6560609 | Frey et al. | May 2003 | B1 |
6571245 | Huang et al. | May 2003 | B2 |
6594684 | Hodjat et al. | Jul 2003 | B1 |
6615166 | Guheen et al. | Sep 2003 | B1 |
6654807 | Farber et al. | Nov 2003 | B2 |
6675198 | Hagiwara et al. | Jan 2004 | B1 |
6714987 | Amin et al. | Mar 2004 | B1 |
6721713 | Guheen et al. | Apr 2004 | B1 |
6732117 | Chilton | May 2004 | B1 |
6816905 | Sheets et al. | Nov 2004 | B1 |
6836786 | Zoller et al. | Dec 2004 | B1 |
6854016 | Kraenzel et al. | Feb 2005 | B1 |
6915345 | Tummala et al. | Jul 2005 | B1 |
6922724 | Freeman et al. | Jul 2005 | B1 |
6954930 | Drake et al. | Oct 2005 | B2 |
6957186 | Guheen et al. | Oct 2005 | B1 |
6970902 | Moon | Nov 2005 | B1 |
6973482 | Mohammed et al. | Dec 2005 | B2 |
6976262 | Davis et al. | Dec 2005 | B1 |
6999912 | Loisey et al. | Feb 2006 | B2 |
7080404 | Abdo et al. | Jul 2006 | B2 |
7096248 | Masters et al. | Aug 2006 | B2 |
7100199 | Ginter et al. | Aug 2006 | B2 |
7111060 | Araujo et al. | Sep 2006 | B2 |
7130891 | Bernardin et al. | Oct 2006 | B2 |
7149698 | Guheen et al. | Dec 2006 | B2 |
7165041 | Guheen et al. | Jan 2007 | B1 |
7181302 | Bayne | Feb 2007 | B2 |
7257613 | Boudnik et al. | Aug 2007 | B2 |
7269580 | Matichuk | Sep 2007 | B2 |
7299274 | Rajarajan et al. | Nov 2007 | B2 |
7313588 | Shotton, Jr. et al. | Dec 2007 | B1 |
7330872 | Peart et al. | Feb 2008 | B2 |
7340654 | Bigagli et al. | Mar 2008 | B2 |
7363363 | Dal Canto et al. | Apr 2008 | B2 |
7502726 | Panasyuk et al. | Mar 2009 | B2 |
7584274 | Bond et al. | Sep 2009 | B2 |
7633483 | Ben-Schachar et al. | Dec 2009 | B2 |
8161160 | London et al. | Apr 2012 | B2 |
8272045 | Azeez et al. | Sep 2012 | B2 |
20010047406 | Araujo et al. | Nov 2001 | A1 |
20020026590 | Kusunoki | Feb 2002 | A1 |
20020059073 | Zondervan et al. | May 2002 | A1 |
20020072974 | Pugliese, III et al. | Jun 2002 | A1 |
20020122056 | Bhesania et al. | Sep 2002 | A1 |
20020124082 | San Andres et al. | Sep 2002 | A1 |
20020129054 | Ferguson et al. | Sep 2002 | A1 |
20020174359 | Haltmeyer | Nov 2002 | A1 |
20020198965 | Kraft | Dec 2002 | A1 |
20030055968 | Hochmuth et al. | Mar 2003 | A1 |
20030126236 | Marl et al. | Jul 2003 | A1 |
20030126265 | Aziz et al. | Jul 2003 | A1 |
20030140143 | Wolf et al. | Jul 2003 | A1 |
20030182392 | Kramer | Sep 2003 | A1 |
20030195950 | Huang et al. | Oct 2003 | A1 |
20030217166 | Dal Canto et al. | Nov 2003 | A1 |
20040010786 | Cool et al. | Jan 2004 | A1 |
20040039827 | Thomas et al. | Feb 2004 | A1 |
20040045004 | Cheenath | Mar 2004 | A1 |
20040073621 | Sampson | Apr 2004 | A1 |
20040103339 | Chalasani et al. | May 2004 | A1 |
20040107125 | Guheen et al. | Jun 2004 | A1 |
20040111519 | Fu et al. | Jun 2004 | A1 |
20040167984 | Herrmann | Aug 2004 | A1 |
20040205473 | Fisher et al. | Oct 2004 | A1 |
20040213220 | Davis | Oct 2004 | A1 |
20040250130 | Billharz et al. | Dec 2004 | A1 |
20050010926 | Narayanaswamy et al. | Jan 2005 | A1 |
20050027784 | Fusari | Feb 2005 | A1 |
20050027787 | Kuhn et al. | Feb 2005 | A1 |
20050044225 | Ota et al. | Feb 2005 | A1 |
20050080909 | Panasyuk et al. | Apr 2005 | A1 |
20050080915 | Shoemaker et al. | Apr 2005 | A1 |
20050097506 | Heumesser | May 2005 | A1 |
20050125529 | Brockway et al. | Jun 2005 | A1 |
20050125530 | Brockway et al. | Jun 2005 | A1 |
20050125560 | Brockway et al. | Jun 2005 | A1 |
20050125739 | Thompson et al. | Jun 2005 | A1 |
20050182838 | Sheets et al. | Aug 2005 | A1 |
20050198303 | Knauerhase et al. | Sep 2005 | A1 |
20050198310 | Kim et al. | Sep 2005 | A1 |
20050251855 | Brandstatter | Nov 2005 | A1 |
20050267972 | Costa-Requena et al. | Dec 2005 | A1 |
20050267974 | Panasyuk et al. | Dec 2005 | A1 |
20060010125 | Beartusk et al. | Jan 2006 | A1 |
20060015740 | Kramer | Jan 2006 | A1 |
20060026235 | Schwarz et al. | Feb 2006 | A1 |
20060026284 | Nguyen | Feb 2006 | A1 |
20060029063 | Rao et al. | Feb 2006 | A1 |
20060052998 | Michelman | Mar 2006 | A1 |
20060053079 | Edmonson et al. | Mar 2006 | A1 |
20060053080 | Edmonson et al. | Mar 2006 | A1 |
20060069797 | Abdo et al. | Mar 2006 | A1 |
20060070131 | Braddy et al. | Mar 2006 | A1 |
20060112181 | Affaki | May 2006 | A1 |
20060136389 | Cover et al. | Jun 2006 | A1 |
20060142878 | Banik et al. | Jun 2006 | A1 |
20060143067 | Calabria | Jun 2006 | A1 |
20060143703 | Hopen et al. | Jun 2006 | A1 |
20060149567 | Muller et al. | Jul 2006 | A1 |
20060195895 | Ben-Shachar et al. | Aug 2006 | A1 |
20060230105 | Shappir et al. | Oct 2006 | A1 |
20060230156 | Shappir et al. | Oct 2006 | A1 |
20060230438 | Shappir et al. | Oct 2006 | A1 |
20060235851 | Akachi | Oct 2006 | A1 |
20060236325 | Rao et al. | Oct 2006 | A1 |
20060248180 | Bernardi et al. | Nov 2006 | A1 |
20060282855 | Margulis | Dec 2006 | A1 |
20070005595 | Gafter | Jan 2007 | A1 |
20070033290 | Valen, III et al. | Feb 2007 | A1 |
20070055650 | Duncan et al. | Mar 2007 | A1 |
20070061266 | Moore et al. | Mar 2007 | A1 |
20070094389 | Nussey et al. | Apr 2007 | A1 |
20070100900 | Gibbins | May 2007 | A1 |
20070124373 | Chatterjee et al. | May 2007 | A1 |
20070150551 | Krishnan et al. | Jun 2007 | A1 |
20070156687 | Idicula et al. | Jul 2007 | A1 |
20070156809 | Dickinson et al. | Jul 2007 | A1 |
20070162749 | Lim | Jul 2007 | A1 |
20070168525 | DeLeon, III et al. | Jul 2007 | A1 |
20070180448 | Low et al. | Aug 2007 | A1 |
20070192329 | Croft et al. | Aug 2007 | A1 |
20070198656 | Mazzaferri et al. | Aug 2007 | A1 |
20070203972 | Wewalaarachchi et al. | Aug 2007 | A1 |
20070233804 | Palekar et al. | Oct 2007 | A1 |
20070244966 | Stoyanov et al. | Oct 2007 | A1 |
20070245240 | Hudson, Jr. | Oct 2007 | A1 |
20070260738 | Palekar et al. | Nov 2007 | A1 |
20070282951 | Selimis et al. | Dec 2007 | A1 |
20080015927 | Ramirez | Jan 2008 | A1 |
20080034071 | Wilkinson et al. | Feb 2008 | A1 |
20080034408 | Duggal | Feb 2008 | A1 |
20080127348 | Largman et al. | May 2008 | A1 |
20080134314 | Hamid | Jun 2008 | A1 |
20080137133 | Trappe | Jun 2008 | A1 |
20080163171 | Chess et al. | Jul 2008 | A1 |
20080209538 | Malakapalli et al. | Aug 2008 | A1 |
20080222299 | Boodaei | Sep 2008 | A1 |
20080228865 | Cruzada | Sep 2008 | A1 |
20080235624 | Murata | Sep 2008 | A1 |
20080250407 | Dadhia et al. | Oct 2008 | A1 |
20090006537 | Palekar et al. | Jan 2009 | A1 |
20090222531 | London et al. | Sep 2009 | A1 |
20090222565 | Ben-Shachar et al. | Sep 2009 | A1 |
20100023582 | Pedersen et al. | Jan 2010 | A1 |
Number | Date | Country |
---|---|---|
1845069 | Oct 2006 | CN |
20030003314 | Jan 2003 | KR |
WO2007075846 | Jul 2007 | WO |
Entry |
---|
Office Action for U.S. Appl. No. 11/771,921, mailed on Apr. 29, 2011, Ashwin Palekar, “Virtual Desktop Integration with Terminal Services”. |
“Access to Work—Dev Design Specification”, Microsoft Confidential, Version 1, pp. 1-25. |
Baude et al., “Interactive and Descriptor-based Deployment of Object-Oriented Grid Applications,” Proceedings 11th IEEE Intl Symposium on High Performance Distributed Computing, 2002, found at at<<http://citeseer.ist.psu.edu/cache/papers/cs/26702/http:zSzzSzwww-sop.inria.frzSzoasiszSzJulien.VayssierezSzpublicationszSzhpdc2002—vayssiere.pdf/baude02interactive.pdf>>, 10 pgs. |
Bhatia et al., “Extending Grid Protocols onto the Desktop using the Mozilla Framework,” Proceedings of GCE'06, 2006, found at <<http://www.cogkit.org/GCE06/papers/CameraReady—126.pdf>>, pp. 1-4. |
Gelu, “Securing Access to External Networks with Authentication, Authorization and Accountability”, found at <<http://www.loloweb.dyns.cx/files/gsec—gelu—laurent.pdf>>, GIAC Security Essentials Certification (GSEC), Apr. 7, 2004, pp. 1-19. |
General, “Secure Foundations for Microsoft Terminal Services,” accessible at <<http://www.giac.org/certified—professionals/practicals/gsec/3578.phpu>>, GSEC Practical V1.4b, Jan. 11, 2004, pp. 1-21. |
Helander, et al., “eLearning for Engineering,” 9th International Conference on Engineering Education, Session M5H, Jul. 23-28, 2006, 6 pgs. |
“iShadow Desktop—The Universal Citrix ICA, Terminal Services RDP, and VNC Client”, available at least as early as Jun. 27, 2007, at <<http://www.dabcc.com/showcontent.aspx?id=2420>>, pp. 1-4. |
Jose, “Workspace Versioning and Configuration Management API”, retrieved on Apr. 15, 2008 at <<http://www.reswhitepapers.com/documents/VirtualizedUserWorkspaceManagementBeyondDesktopManagement.pdf>>, Java Boutique, pp. 1-3. |
Koetzing, “Centralizing Application Access with Visionapp Workspace Management 2008”, retrieved on Apr. 15, 2008 at <<http://www.thomaskoetzing.de/index.php?option=com—content&task=view&id=266&Itemid=289>>, Thomas Koetzing, Mar. 26, 2008, pp. 1-5. |
Lubonski et al., “An Adaptation Architecture to Improve User-Perceived QoS of Multimedia Services for Enterprise Remote Desktop Protocols”, Next Generation Internet Networks, Apr. 18-20, 2005, pp. 149-156. |
“M2 Access to Work—Dev Design Specification”, Microsoft Confidential, Version 1.0, pp. 1-21. |
MacDonald, “Secure Access of Network Resources by Remote Clients,” accessible at <<http://www.sans.org/reading—room/whitepapers/vpns/759.php>>, GSEC version 1.3, SANS Institute, 2002, Feb. 20, 2006, pp. 1-22. |
Mascolo et al., “XMILE: an XML based Approach for Incremental Code Mobility and Update,” Automated Software Engineering, vol. 9, No. 2, Apr. 2002, found at <<http://www.cs.ucl.ac.uk/staff/c.mascolo/www/asemob.pdf>>, pp. 1-15. |
Miles, “Implementing Windows Terminal Server and Citrix MetaFrame on IBM @ server xSeries Servers”, found at <<http://www.redbooks.ibm.com/redpapers/pdfs/redp3629.pdf>>, International Business Machines Corporation, Apr. 2003, 60 pgs. |
“ProLiant Essentials Integrated Lights-Out Advanced Pack”, available at least as early as Jun. 27, 2007, at <<http://h18000.www1.hp.com/products/quickspecs/11052—div/11052—div.HTML>>, Hewlett-Packard, 2004, pp. 1-3. |
“Remote Users Group Policies,” retrieved on Oct. 3, 2007 at <<http://www.cleo.net.uk/index.php?category—id=332>>, CLEO, 2005, 6 pgs. |
Rouse, “Managing Terminal Services with Group Policy,” retreived on Oct. 3, 2007 at <<http://www.msterminalservices.org/articles/Managing-Terminal-Services-Group-Policy.html>>, Mar. 15, 2007, 11 pgs. |
Smith, “S.H.A.U.N: Secure Hospital Access from the University Network,” available at <<http://www.ja.net/community/nhs/shaun.pdf>>, Addenbrooke's NHS Trust, Jan. 2004, pp. 1-11. |
“Technical Overview of Management Services,” Microsoft Windows Server 2003, retrieved from <<http://download.microsoft.com/download/1/c/7/1c701994-9f8a-47c2-ad65-7265356c10eb/Manageover.doc>>, Jul. 2002, 47 pgs. |
“Terminal Services Gateway (TS Gateway)”, retreived on Oct. 3, 2007 at <<http://technet2.microsoft.com/windowsserver2008/en/library/9da3742f-699d-4476-b050-c50aa14aaf081033.mspx?mfr=true>>, Microsoft Corporation, Sep. 24, 2007, 8 pgs. |
Tsai, et al., “Towards Ubiquitous Computing via Secure Desktop Service,” accessible at <<http://ieeexplore.ieee.org/iel5/7544/20542/00949577.pdf?isNumber=>>, IEEE Catalog No. 01CH37239, 2001, pp. 187-190. |
“Using Terminal Services in Application Server Mode with Small Business Server 2000,” retrieved on Oct. 10, 2007 at <<http://www.microsoft.com/technet/prodtechnol/sbs/2000/maintain/termsvcs.mspx>>, 2002, 13 pgs. |
“Virtualized User Workspace Management for Windows Environments”, retrieved at <<http://javaboutique.internet.com/articles/versioning/>>, RES Software, 2007, pp. 1-6. |
“VMware Virtual Infrastructure”, available at least as early as Jun. 27, 2007, at <<http://www.centriserv.com/products—vmware.php>>, CentriServ, 2006, pp. 1. |
“Workspace Integration Into Win7 Networking UI—Feature Summary”, Windows Server—Terminal Services Team, pp. 1-8. |
“Workspace Runtime—Dev Design Specification”, Microsoft Confidential, Version 1, pp. 1-15. |
“TS Session Broker”, Microsoft TechNet, Jan. 21, 2008, retrieved from the internet at <<http://technet.microsoft.com/en-us/library/cc732594(WS.10).aspx>>. |
Non-Final Office Action for U.S. Appl. No. 12/163,673, mailed on Aug. 17, 2011, Ayesha M. Mascarenhas, “Integrated Client for Access to Remote Resources”, 12 pages. |
Office Action for U.S. Appl. No. 11/680,518, mailed on Aug. 2, 2011, Meher Malakapalli, “Strategies for Securely Applying Connection Policies via a Gateway”. |
Final Office Action for U.S. Appl. No. 12/103,542, mailed on Sep. 1, 2011, Ido Ben-Shachar, “Securely Pushing Connection Settings to a Terminal Server Using Tickets”, 27 pages. |
Office Action for U.S. Appl. No. 12/039,732, mailed on Dec. 23, 2011, Ido Ben-Shachar, “Centralized Publishing of Network Resources”, 19 pgs. |
Office Action for U.S. Appl. No. 11/771,921, mailed on Dec. 8, 2011, Ashwin Palekar, “Virtual Desktop Integration with Terminal Services”, 20 pgs. |
The Chinese Office Action mailed Dec. 14, 2012 for Chinese Patent application 200980107105.4, a counterpart foreign application of U.S. Appl. No. 12/039,725, 7 pages. |
The Chinese Office Action mailed Mar. 3, 2012 for Chinese Patent application 200980107105.4, a counterpart foreign application of U.S. Appl. No. 12/039,725, 13 pages. |
Office action for U.S. Appl. No. 12/039,732, mailed on Oct. 9, 2012, Ben-Shachar et al., “Centralized Publishing of Network Resources”, 21 pages. |
Office action for U.S. Appl. No. 11/771,921, mailed on Nov. 15, 2012, Palekar et al., “Virtual Desktop Integration with Terminal Services”, 20 pages. |
Office action for U.S. Appl. No. 12/039,732, mailed on Jun. 7, 2012, Inventor #1, “Centralized Publishing of Network Resources”, 20 pages. |
PCT International Search Report in Application PCT/US2008/066404, mailed Jan. 9, 2009, 2 pages. |
PCT International Search Report in Application PCT/2009/032599 mailed Oct. 16, 2009, 7 pages. |
PCT International Search Report and Written Opinion in Application PCT/US2008/053506, mailed Jun. 24, 2008, 6 pages. |
PCT International Search Report and Written Opinion in Application PCT/US2009/032593, mailed Aug. 25, 2009, 12 pages. |
Chinese Office Action mailed May 29, 2013 for Chinese Patent application 200980107105.4. a counterpart foreign application of U.S. Appl. No. 12/039,725, 12 pages. |
Japanese Office Action mailed Jan. 18, 2013, for Japanese Patent application 2010-548775, a counterpart foreign application of U.S. Appl. 12/039,725, 9 pages. |
Office action for U.S. Appl. No. 11/771,921, mailed on Jun. 10, 2013, Palekar et al., “Virtual Desktop Integration with Terminal Services”, 25 pages. |
RedCruise Corporation, “Front Line of RSS Media Business, Third Internet Media Following Email and Web, Part 1 Basics of RSS Technology, Part 2 Media Characteristics of RSS, Part 3 Examples of Use of RSS, Part 4 the Potential of RSS Is Limitless”, Internet magazine make innovation with technology! No. 127, pp. 44-71, Impress Corporation, Japan, Aug. 1, 2005. |
Russian Office Action mailed Feb. 6, 2013, for Russian Patent application 2010136035, a counterpart foreign application to U.S. Appl. No. 12/039,725, 5 pages. |
Tulluch, et al., “Chapter 8, Enhancement of Functions of Termnal Service, 8.2 TS RemoteApp 8.3 TS Web Access”, Introduction to Windows Server 2008 Technology, 1st Ed., pp. 202-216, Nikkei BP Soft Press, Inc., Japan, Nov. 2007. |
Office action for U.S. Appl. No. 12/103,542, mailed on Jul. 5, 2013, Ben-Shachar et al., “Securely Pushing Connection Settings to a Terminal Server Using Tickets”, 30 pages. |
Number | Date | Country | |
---|---|---|---|
20090327905 A1 | Dec 2009 | US |