Abstract:
An approach is provided to sort objects on a surface of vertically-adjustable low friction transfer modules that are controlled by processors. A request to sort the plurality of objects in a horizontal direction is received with each of the objects is assigned a sort position. Sets of the vertically-adjustable low friction transfer modules are selected. The vertically-adjustable low friction transfer modules are arranged in a grid formation on the surface, with each of the sets of selected transfer modules being underneath a different object. The sets of selected transfer modules are vertically adjusted causing each of the objects to move independently from the other objects while avoiding the other objects in two or more dimensions formed on the surface. The result of the movement is that each of the objects is moved to a position respective of the other objects according to each object's respective sort position.
Abstract:
An approach is provided in which a hardware accelerated bridge executing on a network adapter receives an ingress data packet. The data packet includes a destination MAC address that corresponds to a virtual machine, which interfaces to a software bridge executing on a hypervisor. The hardware accelerated bridge identifies a software bridge table entry that includes the destination MAC address and a virtual function identifier, which identifies a virtual function corresponding to the software bridge. In turn, the hardware accelerated bridge sends the data packet from the hardware accelerated bridge to the software bridge through the identified virtual function.
Abstract:
An apparatus, system, and method are disclosed for improved support of MPS segments in a microprocessor. The virtual address is used to generate possible TLB index values for each of the supported page sizes of the MPS segment associated with the virtual address. The possible TLB index values may be a hash generated using the virtual address and one of the supported page sizes. The TLB is searched for actual TLB index values that match the possible TLB index values calculated using the different supported page sizes. TLB entries associated with those actual TLB index values are checked to determine whether any TLB entry is associated with the virtual address. If no match is found, the real address is retrieved from the PT. The actual page size in the PT is used to generate an actual TLB index value for the virtual address and the TLB entry is inserted into the TLB.
Abstract:
An approach is provided for communicating a media resource. The approach includes generating a widget information in response to a request by a user, associating the widget information with at least a portion of a media resource; encoding at least a portion of the media resource for a real-time exchange of communications, and transmitting at least a portion of the media resource and the widget information from one information handling system to another.
Abstract:
According to one embodiment of the present disclosure, an approach is provided in which a policy server receives a request for a policy from a requestor. The policy server identifies an initiating virtual machine; the initial virtual machine's corresponding virtual network; and a destination virtual machine. Next, a policy corresponding to sending data from the first virtual machine to the second virtual machine is selected. The policy includes one or more logical references to the virtual network and does not include a physical reference to a physical entity located on a physical network. In turn, a physical path translation corresponding to the selected policy is identified and sent to the requestor.
Abstract:
A system and method for a non-sequential undo mechanism is presented. An action removal manager stores program states and action descriptions that it receives from a user in a program log corresponding to a software application. In turn, the action removal manager allows the user to remove an action from the program log without first removing actions subsequent to the action that, as a result, undoes an action to a file without undoing subsequent actions to the file. In one embodiment, the undo request includes a request to remove two or more actions from the program log. In this embodiment, the action removal manager evaluates the earliest action description to remove in the program log and then proceeds to evaluate subsequent action descriptions for removal.
Abstract:
An approach is provided in which a device is detected when it has been added to an operating system partition. The detecting occurs during a dynamic reconfiguration process, and the device is associated with a device type. A parent device is identified that corresponds to the added device. The identifying of the parent device is performed during the dynamic reconfiguration process and the identification of the parent device is based on the device type of the added device with the identified parent device corresponding to a parent device name. A unit address corresponding to the added device is retrieved and this retrieved unit address and the identified parent device name are passed to a configuration manager process. The added device is then configured based on the identified parent device name.
Abstract:
An approach is provided for selecting one or more trust factors from trust factors included in a trust index repository. Thresholds are identified corresponding to one or more of the selected trust factors. Actions are identified to perform when the selected trust factors reach the corresponding threshold values. The identified thresholds, identified actions, and selected trust factors are stored in a data store. The selected trust factors are monitored by comparing one or more trust metadata scores with the stored identified thresholds. The stored identified actions that correspond to the selected trust factors are performed when one or more of the trust metadata scores reach the identified thresholds. At least one of the actions includes an event notification that is provided to a trust data consumer.
Abstract:
A system, method, and program product is provided that distributes authorized changes to the organization's entities and has the individual computer systems police configuration changes. A system receives change approval packages, each of the change approval packages including authorized change identification data that identifies authorized changes to the system. The authorized change identification data are stored in a storage area of the system. Subsequently, a change package is received by the computer system. The change package includes a change to the computer system and metadata that identifies the change. The metadata is compared with the authorized change identification data. If the metadata matches one of the authorized change identification data, then the change is installed, otherwise the change is rejected.
Abstract:
An approach is provided that receives a request to perform an action by an information handling system that includes a processor. In response to the request, a captcha request that corresponds to a captcha is transmitted to a foldable display screen. A response is received from the foldable display screen with the response including one or more bends of the foldable display screen. The received one or more bends are compared to one or more expected bends included in the captcha. The requested action is performed in response to the comparison revealing that the received one or more bends match the one or more expected bends. On the other hand, performance of the requested action is inhibited in response to the comparison revealing that at least one of the received one or more bends fails to match at least one of the one or more expected bends.