Abstract:
A serial data link is to be adapted during initialization of the link. Adaptation of the link is to include receiving a pseudorandom binary sequence (PRBS) from a remote agent, analyzing the PRBS to identify characteristics of the data link, and generating metric data describing the characteristics.
Abstract:
Methods and apparatus relating to processor extensions for execution of secure embedded containers are described. In an embodiment, a scalable solution for manageability function is provided, e.g., for UMPC environments or otherwise where utilizing a dedicated processor or microcontroller for manageability is inappropriate or impractical. For example, in an embodiment, an OS (Operating System) or VMM (Virtual Machine Manager) Independent (generally referred to herein as “OI”) architecture involves creating one or more containers on a processor by dynamically partitioning resources (such as processor cycles, memory, devices) between the HOST OS/VMM and the OI container. Other embodiments are also described and claimed.
Abstract:
In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed.
Abstract:
In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed.
Abstract:
In an embodiment, a processor includes a graphics domain including a graphics engines each having at least one execution unit. The graphics domain is to schedule a touch application offloaded from a core domain to at least one of the plurality of graphics engines. The touch application is to execute responsive to an update to a doorbell location in a system memory coupled to the processor, where the doorbell location is written responsive to a user input to the touch input device. Other embodiments are described and claimed.
Abstract:
Methods, apparatus, systems, and articles of manufacture are disclosed to improve device connectivity. An example system includes an electronic device to broadcast a message including a uniform resource indicator (URI), the URI corresponding to the electronic device, and an endpoint device to, after obtaining the message, launch a user interface to display a request for authorization to connect to the electronic device, after obtaining the authorization, retrieve an instance of a container based on the URI, and execute a service with the container based on data obtained from the electronic device.
Abstract:
Technologies for interfacing an input overlay device with a touch screen of a computing device are disclosed. A computing device includes a touch screen and at least one processor to execute instructions to: determine parameters associated with an input overlay device overlying the touch screen, the input overlay device separate from the computing device, the parameters to identify a first area of the touch screen and a second area of the touch screen different than the first area, the first area corresponding to an area of the touch screen covered by the input overlay device; detect a position of a touch on the touch screen; if the position of the touch is in the first area, determine an input for the computing device based on the position of the touch; and if the position of the touch is in the second area, ignore the touch.
Abstract:
Methods and apparatus to operate closed-lid portable computers are disclosed. An example portable compute device includes: a microphone; a speaker; a first camera to face a first direction; and a second camera to face a second direction, the second direction opposite the first direction. The compute device further includes communications circuitry; a first display; a second display separate from the first display; and a hinge to enable the first display to rotate relative to the second display between an open position and a closed position. At least a portion of the second display is capable of being visible when the first display is rotated about the hinge to the closed position. The portion of the second display is multiple times longer in a third direction than in a fourth direction perpendicular to the third direction, the third direction extending parallel to an axis of rotation of the hinge.
Abstract:
Systems, apparatuses and methods may provide for detecting an identifier communication from a writing implement and transitioning a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers. Moreover, a plurality of additional interior pages of the electronic notepad may be maintained in the locked state while the previously modified interior page is in the unlocked state.
Abstract:
Technologies for interfacing an input overlay device with a touch screen of a computing device are disclosed. A computing device includes a touch screen and at least one processor to execute instructions to: determine parameters associated with an input overlay device overlying the touch screen, the input overlay device separate from the computing device, the parameters to identify a first area of the touch screen and a second area of the touch screen different than the first area, the first area corresponding to an area of the touch screen covered by the input overlay device; detect a position of a touch on the touch screen; if the position of the touch is in the first area, determine an input for the computing device based on the position of the touch; and if the position of the touch is in the second area, ignore the touch.