Abstract:
In one aspect a method includes: detecting an initial input indicating a user selection disabling touch input for a touch input device of an information handling device; providing a dialog box to a user offering an opportunity to provide an appropriate input confirming the initial input; responsive to expiration of a predetermined time, reverting back to a default mode wherein touch input is enabled; and responsive to receiving a confirming input prior to the expiration of the predetermined time, disabling touch input on the touch input device of the information handling device. Other aspects are described and claimed.
Abstract:
Systems, methods and products directed toward creating device preloads via employing base and additional image content. One aspect includes communicating an aspect of an information handling device, and assimilating additional image content at the information handling device responsive to communication of the aspect of the device, wherein a base image and the additional image content are combined to form a unitary device image. Other embodiments are described herein.
Abstract:
An apparatus and method are disclosed for dynamic keystone correction. A measurement module measures distances from a projector to each of at least three projected points of a first projected image projected on a first surface with projection angles between each projected point. The at least three projected points are endpoints for at least two vectors with a target ratio of vector lengths. An adjustment module calculates an actual ratio of actual vector lengths of the at least two vectors. The adjustment module further adjusts a first aspect ratio of first projected image until the actual ratio is equivalent to the target ratio.
Abstract:
Devices, methods and products are described that provide for recording an unauthorized event, such as rooting, on an information handling device. One aspect provides a method comprising determining whether at least one unauthorized event has occurred on an information handling device; setting at least one unauthorized event flag stored on the information handling device responsive to an unauthorized event; and allowing external access to the at least one unauthorized event flag. Other embodiments and aspects are also described herein.
Abstract:
Systems, methods and products are described that provide homepage re-assignment. One aspect includes displaying a default homepage desktop view from among a plurality of scrollable desktop views; receiving user input via a user input device; opening a homepage re-assignment utility responsive to receiving said user input, said homepage re-assignment utility including a display indicating one or more desktop views selectable as a new homepage; and responsive to receiving a user input indicating a selection of a desktop view as a new homepage, changing a default homepage setting to a desktop view selected as a new homepage. Other embodiments are described.
Abstract:
The collaborative sharing of resources on demand based on proximity, within a group or network of computers. Broadly contemplated herein the “tiling” of a collection of logically adjacent individual graphical desktops in a virtual desktop. In such a setting, the action of dragging a window or icon off of one desktop and onto another would effectively transfer user interactability, and/or perceived ownership of the object, to the desktop where the window or icon graphically “lands”.
Abstract:
The invention broadly contemplates a computing system that offers high-speed recovery. The system is configured to offer such a high-speed solution via an instant roll back scheme. The system utilizes a virtualization to handle the system state and provide a rescue and recovery like solution without requiring a full system reboot. The system is configured to utilize virtualization, e.g. through the use of a hypervisor to track the fundamental system components. This enables the system to very quickly back the system up on a rolling basis via tracking atomic changes and offering the instant rollback at essentially any point following an atomic change, should common system difficulties be encountered.
Abstract:
A method for preventing malicious software from execution within a computer system is disclosed. A permutation is performed on a subset of instructions within an application program to yield a permuted sequence of instructions before any actual execution of the application program on the computer system. A permutation sequence number of the permuted sequence of instructions is stored in a permuted instruction pointer table. The permuted sequence of instructions is executed in an execution module that is capable of translating the permuted sequence of instructions to an actual machine code of a processor within the computer system according to the permutation sequence number of the permuted sequence of instructions stored in the permuted instruction pointer table.
Abstract:
An apparatus, method, and computer readable storage medium are disclosed to recover from lost resources in a distributed server environment. A status monitor module receives, at a first computer, periodic status messages from a peer computer. Each periodic status message indicates that the peer computer is providing a service for which the first computer serves as a backup service provider. A failure detection module determines, based on the periodic status messages, that the peer computer has stopped providing the service. An advancement module provides the service, at the first computer, in response to determining that the peer computer has stopped providing the service.
Abstract:
Embodiments generally provide a utility for migrating an existing user operating system to a remote storage device. A utility for migrating user operating systems according to embodiments automatically detects and fixes inconsistent partition interdependencies resulting from the migration process.