Abstract:
A display manager is configured to handle the drawing of windows on one or more displays for an application differently based on detected motion information that is associated with a device. The display manager may not display windows for some applications while motion is detected, while the display manager may display windows for other applications even when motion is detected. Motion enabled applications may interact with the display manager and motion information to determine how to display windows while motion is detected.
Abstract:
In a method of synchronizing with a separated disk cache, the separated cache is configured to transfer cache data to a staging area of a storage device. An atomic commit operation is utilized to instruct the storage device to atomically commit the cache data to a mapping scheme of the storage device.
Abstract:
In a method of synchronizing with a separated disk cache, the separated cache is configured to transfer cache data to a staging area of a storage device. An atomic commit operation is utilized to instruct the storage device to atomically commit the cache data to a mapping scheme of the storage device.
Abstract:
In a method of synchronizing with a separated disk cache, the separated cache is configured to transfer cache data to a staging area of a storage device. An atomic commit operation is utilized to instruct the storage device to atomically commit the cache data to a mapping scheme of the storage device.
Abstract:
Described is a technology by which a memory controller is a component of a hybrid memory device having different types of memory therein (e.g., SDRAM and flash memory), in which the controller operates such that the memory device has only a single memory interface with respect to voltage and access protocols defined for one type of memory. For example, the controller allows a memory device with a standard SDRAM interface to provide access to both SDRAM and non-volatile memory with the non-volatile memory overlaid in one or more designated blocks of the volatile memory address space (or vice-versa). A command protocol maps memory pages to the volatile memory interface address space, for example, permitting a single pin compatible multi-chip package to replace an existing volatile memory device in any computing device that wants to provide non-volatile storage, while only requiring software changes to the device to access the flash.
Abstract:
Oftentimes users can be exposed to media content such as advertisements while in a non-connective state. Advertisement providers can desire to obtain information related to the exposure and users can be rewarded for the exposure. Therefore, a record can be retained related to advertisement exposure and the record can be transmitted when it is determined that the user is in a connective state. Since personal information can be held upon the record and there can be motivation to alter the record, the record can be stored in hardware, such as a microcontroller of a flash memory device, prior to transmission.
Abstract:
Oftentimes, computer files, information packets, and the like share identical data portions that cause duplicate storing. The files and/or packets can be logically divided and checks can be performed to determine if there are shared portions. If shared portions exist, then as opposed to making a duplicate copy of information, a pointer can be produced that identifies where the portion is saved. In addition, pointers can be used in compression of information such that a compressed file can identify an original copy—the original copy can be used to decompress the information.
Abstract:
A user can be provided a variety of incentives to take a route that is different from a standard path in order to relieve path load balancing issues. Information on a primary path can be collected and analyzed to determine if it would be beneficial to encourage users to take an alternate path. If it is determined that users should be encouraged to take another path, then analysis of potential users can occur. A result of the user analysis can be used to select users that are offered to take the alternate path as well as an incentive offered to the user to encourage her to take the alternate path.
Abstract:
Routes can be produced based on safety characteristics of paths that are included in the route. Safety characteristics can include how susceptible an area surrounding a path is to crime as well as traffic data, such as how many automobile accidents take place on average. Various amounts of safety information can be gathered and a particular path can be assigned a safety score. Analysis can run on different path combinations that would take a user from a starting point to an intended destination. A route can be produced based on the safety score alone, such as a route with a lowest score, based on the safety score with other factors such as anticipated traffic, and the like.
Abstract:
Systems and methods of sharing files and data in memory between the two operating systems running on a computing device. A main operating system (OS) may execute on the computing device an provide numerous system features and functionality. To conserver power, the main OS may unload, or the computer may be reset, suspended or be shutdown. Prior to doing so, the main OS writes data to a known memory location that allows access by a secondary OS when the main OS is not present. The secondary OS provides a limited set of functionalities, while being able to use and interact with the data stored in the known memory location. Information about the data and permissions are stored in mailbox that is accessible to both operating system such that changes made when the secondary operating system is active are synchronized with the main operating system.