摘要:
A method, terminal and computer-readable storage medium for collecting information resources are provided in the field of internet technologies. The method includes: acquiring 201 key information of information resources to be collected when a collect event occurred on a display page of any application has been monitored, wherein the display page is configured to display the information resources to be collected and the key information is configured to uniquely identify the information resources to be collected; and storing 202 the key information of the information resources to be collected in a centralized favorites, wherein the centralized favorites is configured to display 203 key information of collected information resources which come from at least one application on a specified interface.
摘要:
A buffer management mechanism in a multi-core processor for use on a modem in a telecommunications network is described herein. The buffer management mechanism includes a buffer module that provides buffer management services for one or more Layer 2 applications, wherein the buffer module at least provides a user space application interface to application software running in user space. The buffer management mechanism also includes a buffer manager that manages a plurality of separate pools of tokens, wherein the tokens comprise pointers to memory areas in external memory. In addition, the buffer management mechanism includes a custom driver that manages Data Path Acceleration Architecture (DPAA) resources including buffer pools and frame queues to be used for user plane data distributing.
摘要:
Disclosed herein are systems, methods, and software for facilitating the integration of native applications and virtualized applications. Calls initiated from within a native application associated with a native namespace are monitored for integrated calls. The integrated calls involve resources accessible through a virtual namespace. Upon detecting an integrated call, the integrated call is provided with access to a corresponding resource by way of the virtual namespace.
摘要:
The invention relates to a method for controlling the use of hardware resources of a computer system by an application that is executed on an operating system comprising at least one application programming interface (API) that is executed on this computer system, using an executable piece of code adapted for being injected into a process belonging to the application. The method comprises: redirecting an API service to a corresponding service comprised in the piece of code; intercepting the call from the process to the API service; and acting on a software entity belonging to the process being executed on the basis of the interception of the call from the process to the API service.
摘要:
A method for invoking a fingerprint identification device is provided. The method includes the following. When a request of a current application to invoke a fingerprint identification device is detected, whether the fingerprint identification device is occupied by a historical application is determined. When the fingerprint identification device is occupied by the historical application, whether the current application meets a preset invoking condition is determined, and then the fingerprint identification device is controlled to process the request of the current application according to the determination result. In addition, an apparatus for invoking a fingerprint identification device corresponding to the method and a mobile terminal are provided.
摘要:
An apparatus comprising a plurality of physical IO ports configured to couple to a plurality of remote LCs that provide IO resources, and a processor coupled to the plurality of physical IO ports and configured to map the remote LCs to a plurality of vNICs by allocating at least some of the IO resources to the local vNICs, receive an OS kernel IO call comprising a request to access a first of the vNICs, determine a first of the remote LCs that corresponds to the first vNIC, and direct the request to access the first remote LC.
摘要:
The invention relates to a method and an arrangement for enabling a processing step for an object that is to be processed, wherein an availability result, which indicates an availability of the processing step, is determined for the processing step on the basis of rules.
摘要:
Embodiments of the present invention relate to the field of storage technologies and provide an IO bandwidth control method, an IO access request processing method, an apparatus, and a system, so that a manner of allocating an IO bandwidth is relatively flexible. The IO bandwidth control method is applied to a distributed file system that includes a name node and at least one data node. The method includes: determining, by the name node, an IO bandwidth of each data node in the at least one data node and an IO bandwidth of a first tenant; and instructing, by the name node based on the IO bandwidth of each data node in the at least one data node and the IO bandwidth of the first tenant, the at least one data node to allocate the at least one IO bandwidth to the first tenant, where the at least one IO bandwidth is in a one-to-one correspondence with the at least one data node, and each IO bandwidth in the at least one IO bandwidth is greater than 0 and is less than or equal to an IO bandwidth of a corresponding data node.
摘要:
Systems and methods for performing a distributed computing task may use a plurality of distributed digital data resources. The distributed computing task may include dividing the computing task into sub-tasks for performance by a plurality of distributed worker nodes. The worker nodes may include a first worker node having at least partial access to a first digital data resource associated with a first set of rules corresponding to first conditions for accessing the first digital data resource and/or for computations operating on the first digital data resource. The worker nodes may include a second worker node having at least partial access to a second digital data resource associated with a second set of rules corresponding to second conditions for accessing the second digital data resource and/or for computations operating on the second digital data resource. The first conditions may differ from the second conditions.