Abstract:
Described is a technology by which a user is able to determine the content of a storage device, including when the storage device is non-operational. A user may use a device and/or program to provide a wirelessly-read identifier to query a repository that maintains cataloged data for the user's storage device. The query to the repository returns the cataloged data for that storage device in response, which is output to the user and the user knows the storage device's contents. Alternatively, the user may obtain a list of storage devices from the repository, and select one to view its cataloged data. When the storage device is operational, the persistent repository is updated with any changes to keep the cataloged data synchronized with the stored content.
Abstract:
An exemplary apparatus includes one or more processors, volatile memory, a storage drive and circuitry configured to establish a network connection and to attempt to send credentials via an established network connection. Such an apparatus further includes circuitry configured, responsive to authentication failure after an attempt to send credentials, to release an implemented security policy and load an operating system stored on the storage drive, and, responsive to an attempt to send credentials, to maintain an implemented security policy and to use an operating system exposed via an established network connection and associated with the sent credentials Such an apparatus optionally includes circuitry configured to implement a security policy that isolates at least a portion of a local storage drive. Various other apparatuses, systems, methods, etc., are also disclosed.
Abstract:
An aspect provides a method, comprising: detecting an incoming voice call at an information handling device; detecting one or more external notification extension conditions at the information handling device; and in response to detecting one or more external notification extension conditions at the information handling device, extending a notification of the incoming voice call at the information handling device. Other aspects are described and claimed.
Abstract:
In one aspect a method includes: detecting an initial input indicating a user selection disabling touch input for a touch input device of an information handling device; providing a dialog box to a user offering an opportunity to provide an appropriate input confirming the initial input; responsive to expiration of a predetermined time, reverting back to a default mode wherein touch input is enabled; and responsive to receiving a confirming input prior to the expiration of the predetermined time, disabling touch input on the touch input device of the information handling device. Other aspects are described and claimed.
Abstract:
Systems, methods and products directed toward creating device preloads via employing base and additional image content. One aspect includes communicating an aspect of an information handling device, and assimilating additional image content at the information handling device responsive to communication of the aspect of the device, wherein a base image and the additional image content are combined to form a unitary device image. Other embodiments are described herein.
Abstract:
An apparatus and method are disclosed for dynamic keystone correction. A measurement module measures distances from a projector to each of at least three projected points of a first projected image projected on a first surface with projection angles between each projected point. The at least three projected points are endpoints for at least two vectors with a target ratio of vector lengths. An adjustment module calculates an actual ratio of actual vector lengths of the at least two vectors. The adjustment module further adjusts a first aspect ratio of first projected image until the actual ratio is equivalent to the target ratio.
Abstract:
Devices, methods and products are described that provide for recording an unauthorized event, such as rooting, on an information handling device. One aspect provides a method comprising determining whether at least one unauthorized event has occurred on an information handling device; setting at least one unauthorized event flag stored on the information handling device responsive to an unauthorized event; and allowing external access to the at least one unauthorized event flag. Other embodiments and aspects are also described herein.
Abstract:
Systems, methods and products are described that provide homepage re-assignment. One aspect includes displaying a default homepage desktop view from among a plurality of scrollable desktop views; receiving user input via a user input device; opening a homepage re-assignment utility responsive to receiving said user input, said homepage re-assignment utility including a display indicating one or more desktop views selectable as a new homepage; and responsive to receiving a user input indicating a selection of a desktop view as a new homepage, changing a default homepage setting to a desktop view selected as a new homepage. Other embodiments are described.
Abstract:
The collaborative sharing of resources on demand based on proximity, within a group or network of computers. Broadly contemplated herein the “tiling” of a collection of logically adjacent individual graphical desktops in a virtual desktop. In such a setting, the action of dragging a window or icon off of one desktop and onto another would effectively transfer user interactability, and/or perceived ownership of the object, to the desktop where the window or icon graphically “lands”.
Abstract:
The invention broadly contemplates a computing system that offers high-speed recovery. The system is configured to offer such a high-speed solution via an instant roll back scheme. The system utilizes a virtualization to handle the system state and provide a rescue and recovery like solution without requiring a full system reboot. The system is configured to utilize virtualization, e.g. through the use of a hypervisor to track the fundamental system components. This enables the system to very quickly back the system up on a rolling basis via tracking atomic changes and offering the instant rollback at essentially any point following an atomic change, should common system difficulties be encountered.