Abstract:
In one example, a notification may be generated to prompt a user to clean a personal computing device. The notification may be based upon usage data of the personal computing device. Multiple types of usage data may be determined and combined to create a composite usage value. The composite usage value may be compared to a threshold usage value. A notification may be generated if the composite usage value exceeds the threshold usage value.
Abstract:
One of a first voltage and a second voltage may be selected based on input from a basic input/output system (BIOS). One of the selected voltage and no voltage may be output to a carrier detect (CD) pin and a ring Indicator (RI) pin of a serial communication port, based on the input from the BIOS.
Abstract:
In one example, a notification may be generated to prompt a user to clean a personal computing device. The notification may be based upon usage data of the personal computing device. Multiple types of usage data may be determined and combined to create a composite usage value. The composite usage value may be compared to a threshold usage value. A notification may be generated if the composite usage value exceeds the threshold usage value.
Abstract:
Examples relate to managing a display input An example system to manage a display input is provided herein. Management of display input includes a determination of a display mode selected. Management of display input also includes control of connections and transfer of data between an external device and an internal device. Management of display input further includes adjustment of a display setting based on display mode.
Abstract:
One of a first voltage and a second voltage may be selected based on input from a basic input/output system (BIOS). One of the selected voltage and no voltage may be output to a carrier detect (CD) pin and a ring Indicator (RI) pin of a serial communication port, based on the input from the BIOS.
Abstract:
Examples disclose a computing system comprising a host device with a connection socket to support multiple types of cables by detecting a first key position and a second key position for determination of the type of cable. Further, the computing system comprises a switching circuit to determine a logic state of each of the key positions. Additionally, the switching circuit is to deliver power associated with the type of cable based on the logic states of the key positions.
Abstract:
An example method includes receiving an indication of a first level of authentication for an electronic device, the first authentication being associated with a first authentication device associated with the user; receiving an indication of a second level of authentication for the electronic device, the second authentication being associated with a second authentication device associated with the user, the second authentication device being different from the first authentication device; and upon receiving the indication of at least the first level of authentication and the second level of authentication, allow access to the electronic device.
Abstract:
Circuits for preventing power drawn by a load from exceeding a threshold are provided. A first circuit monitors power supplied to the load and disables a power supply if a threshold is exceeded. A second circuit disconnects the load from the power supply if the threshold is exceeded.
Abstract:
Example implementations relate to controlling a field-effect transistor (FET) switch in a load switch circuit. A digital pulse width modulated (PWM) voltage signal may be applied to a gate of a FET switch. The pulse width of the PWM voltage signal may be set to a first value. The pulse width of the digital PWM voltage signal may be digitally incremented to a second value. The digital PWM voltage signal having the pulse width of the second value may be applied to the gate of the FET switch.
Abstract:
A computer monitors a connected state of a cash drawer and the open/closed status of one or more trays by way of circuitry and a BIOS program code. The computer opens the respective trays of the cash drawer by way of the circuitry and the BIOS program code. Alert messaging or alarm functions can also be performed in accordance with the monitoring. Cash drawer security, management and user convenience are improved accordingly.