摘要:
A system and associated method for synchronizing a record with a web document. A synchronizer selects a web document that is stored in a published web document repository of a content management system. The oldest web document since the latest update is selected and checked for availability. The synchronizer locates a record that corresponds to the selected web document. The synchronizer then checks respective version of the web document and the record to determine whether the record correctly represents the web document. The synchronizer then verifies whether the selected web document is available to users to avoid synchronizing latent web document that is not available to users. The synchronizer updates the located record.
摘要:
A conflict resolution system for interleaved memories in processors capable of issuing multiple independent memory operations per cycle. The conflict resolution system includes an address bellow for temporarily storing memory requests, and cross-connect switches to variously route multiple parallel memory requests to multiple memory banks. A control logic block controls the address bellow and the cross-connect switches to reorder the sequence of memory requests to avoid conflicts. The reordering removes conflicts and increases the occurrence of alternating memory requests that can issue simultaneously.
摘要:
A split level cache memory system for a data processor includes a single chip integer unit, an army processor such as a floating point unit, an external main memory and a split level cache. The split level cache includes an on-chip, fast local cache with low latency for use by the integer unit for loads and stores of integer and address data and an off-chip, pipelined global cache for storing arrays of data such as floating point data for use by the array processor and integer and address data for refilling the local cache. Coherence between the local cache and global cache is maintained by writing through to the global cache during integer stores. Local cache words are invalidated when data is written to the global cache during an army processor store.
摘要:
A deformable cap for a computer pointing device is provided that may be particularly useful for miniature joystick-type pointing devices such as the TrackPoin™ and ScrollPoint™ devices manufactured by the IBM corporation of Armonk, N.Y. When an operator places a fingertip on the cap, the cap deforms thereby advantageously increasing the surface area of contact between the cap and the fingertip. All embodiments of the cap are placed on an upper portion of a control stick of the pointing device. A first embodiment of the cap includes a bottom support, a disc, a plurality of wire supports, and an elastic cover that overlays the disc and wire supports. An inner surface of the cover may be scored to ensure repeatable deformation of the cap. A spring may be attached to a lower surface of the disc to assist the cap in regaining its original shape once the operator's fingertip is removed. A second embodiment of the cap includes a bottom support, a plurality of wire supports, and an elastic cover overlaying the wire supports. An inner surface of the cover may be scored. The cap may be hollow or may be filled with a deformable material. A third embodiment of the cap includes a bottom support and an elastic cover in which an inner surface of the cover may be scored. The cap may be hollow or may be filled with a deformable material.
摘要:
A method, apparatus, and computer instructions for leasing a unique digital item in a network data processing system. A listing request is received for a payment and a deposit in the account of a first party. A listing request is received for a unique digital item in the account of a second party. Responsive to receiving the listing requests, the respective digital properties are transferred to a temporary storage account in association with retrieval tags. Listings for the digital properties appear on a trusted third-party leasing service. A lease contract is drawn up between the parties. After all parties have signed the lease agreement, the payment is transferred to the second party and the unique digital item is transferred to the first party. The deposit is held by the trusted third-party leasing service until the unique digital item is returned.
摘要:
Previously conducted conversations in real-time collaboration messages are persistently stored, either by client or a server, and then are associated with conversational items presented to a user (e.g. contact names, topics, etc.). An icon is provided near each listed item, which when selected, displays to the user summaries or titles of all transcripts to which the selected item pertains or relates. The user may select one or more summaries or titles for which the conversation is to be resumed, causing the system to retrieve the stored transcript and resume appending new conversational entries to it, so that the user recovers conversational context effortlessly and accurately. Enhanced versions of the invention include sharing of transcripts so that all participants receive the context of the conversation, and server-side or client-side implementations.
摘要:
An alarm system and method by which a user can be alerted to a detected condition regarding their vehicle, can view what is happening in and around the vehicle, and can remotely turn off or reset the alarm if it is determined that an alarm is false. This is provided using one or more cameras and a cellular telephone to which the pictures can be sent.
摘要:
A method, means, and device for controlling the amount of light penetration through a viewing port and, more particularly, a new and improved method of controlling one or more pane such that the one or more pane varies the degree of energy reflection and absorption of a single viewing port.
摘要:
A method for preventing data loss and deadlock in a multi-processor computer system wherein at least one processor in the computer system includes a split-level cache. The split-level cache has a byte-writable first-level and a word-writable second level. The method monitors the second level cache to determine if a forced atomic (FA) instruction is in a second level cache pipeline. If an FA instruction is determined to be in the second level cache pipeline, then interventions to the second level cache are delayed until the FA instruction exits the second level cache pipeline. In this manner data written by operation of cache memory access instruction that cause the interventions is not destroyed by the execution of the FA instruction, thereby preventing data loss. The method also monitors the second level cache pipeline to determine if a possible miss (PM) instruction is in the second level cache pipeline. If a PM instruction is determined to be in the second level cache pipeline, the FA instructions are prevented from entering the second level cache pipeline such that execution of interventions to the second level cache is not prevented when an instruction in the second level cache may be detained to process an intervention in its behalf, thereby preventing deadlock between processing units of the computer system.