Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

A method to avoid duplicated PC personalization by reviewing log files from multiple operators

IP.com Disclosure Number: IPCOM000018589D
Original Publication Date: 2003-Jul-25
Included in the Prior Art Database: 2003-Jul-25
Document File: 5 page(s) / 132K

Publishing Venue

IBM

Abstract

Assuming a number of PC's are personalized (configured with a set of setup values which is unique to each PC) by more than one operator using a single common setup value table which lists all of target PC's, this article describes a software mechanism to avoid duplicated usage of a setup value set by an operator, and to detect duplicated usage among multiple operators, by using a key data item defined prior to the operation.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 55% of the total text.

Page 1 of 5

  A method to avoid duplicated PC personalization by reviewing log files from multiple operators

      It is assumed a number of PC's are personalized (configured with a set of setup values which is unique to each PC) by more than one operator using copies of a single common setup value table which lists all of target PC's. Also, it is assumed target PC's do not have network capability that may be utilized to share the single value table among the target PC's.

    To automating the operation, two software components are used; (a) a management program, used by an administrator to create a data file containing personalization data for all target PC's, and (b) a personalization process program, running on the target PC's to personlize them with values in a record of the data file. The data file consists of records, each of which is corresponding to a specific target PC, and a single data file contains records for all target PC's. The data file cannot be splitted for each of operators because, as an assumption, it is impossible to assign each of target PC's to a specific operator prior to start of the personalization process.

The following steps show how this system works:
(1) In the preparation phase of the process using the management program, one of the setting items (a field in the data file record) is selected and defined as the "key data item" identifying the record (i.e., corresponding specific PC). This is done through a GUI provided by the management program. The key data item must be a setting item such that its value is unique for each of the target PC's. [Fig. 1]
(2) At the beginning of the personalization process on one of target PC's, the operator provides the personalization process program with the key data item, which identifies the target PC. [Fig. 2] At this time, if process log data indicates the input key data value has already been used for another target PC, the program rejects t...