摘要:
Methods and apparatus enable calibration of a display for a particular user thereof. An image displayed such as by an interactive system is adjusted based on physical attributes associated with the user or other characteristics of the user in order to customize the image being displayed. For some embodiments, change to the image includes dynamically resizing and/or repositioning a projected display based on the size and reach of the user to make items shown in the display such as menus or hyperlinks more easily accessible to the user. Input from a camera of the interactive system can be utilized to detect the attribute such as a height of the user for correlation to a typical reach of the user. In operation, the interactive system can therefore dynamically adapt to each unique user as different users approach and interact with the interactive system by automatic calibration of the image being displayed.
摘要:
A method, apparatus, system, and signal-bearing medium that in an embodiment determine whether a window meets a criteria. If the window meets the criteria, the window is sent to a personal digital assistant. If the window does meet the criteria, then the window is sent to a computer display. In an embodiment, the personal digital assistant is attached via a hinge to the computer and is capable of rotating via the hinge between a closed position atop a lid portion of the computer to an open position side-by-side with the lid portion. In this way, the display of the computer is viewable simultaneously with the personal digital assistant.
摘要:
A system and method for protecting streams in a mixed infrastructure includes determining processing elements that are to access a data stream in a stream processing environment and determining a security level for each processing element. Keys are generated per stream per processing element in accordance with the security level. The keys are associated with processing elements in an access control list in a location accessible by producing and consuming processing elements. The stream is decrypted for processing using keys released upon authenticating processing elements in accordance with the access control list. At security boundaries, the stream is re-encrypted in accordance with a next processing element.
摘要:
A facility is provided for transitioning a database service from a failing, primary server to another server of a computing environment including a plurality of servers, at least some of which have a common database service capability, but not commonly replicated supporting databases. The facility includes, responsive to detection of failure at the primary server, selecting another server of the plurality of servers to function as database service backup for the primary server, updating at least one configuration file of the computing environment to indicate that the another server is to function as database service backup for the primary, failing server, and dynamically creating at least one database structure at the another server. The dynamically created at least one database structure supports the database service backup function at the another server and corresponds to a database structure of a database supporting the database service at the primary server.
摘要:
The present invention concerns methods and apparatus for displaying real-time search trends in graphical search specification and result interfaces. In the methods and apparatus of the present invention, a user enters a text-based search argument using a search specification and result interface associated with a search engine. Search results received in response to the search argument are listed in a search results display component of the search specification and result interface. The user then modifies the search argument using a graphical search argument representation component which visually depicts the search argument and associated search parameters (such as, for example, location; search term frequency, etc.). The graphical search argument representation component has controls for modifying the search argument using a visual paradigm. As the user modifies the search argument with the controls of the graphical search argument representation component, graphical search trend indicators indicate the effect on search results in real time. The effect of modifications to the search argument on search results as reflected in the graphical search trend indicators help a user to decide whether modifications to the search argument made with the graphical search argument representation component are improving, or worsening, the accuracy of the search.
摘要:
A method, apparatus, and computer-usable medium for displaying a primary presentation on a display, where the primary presentation includes a collection of frames; in response to receiving a request to overlay the primary presentation with a secondary presentation, analyzing the plurality of frames to identify at least one safe region determined to be suitable for overlaying said primary presentation with a secondary presentation; presenting a preview of the secondary presentation in at least one safe region; in response to receiving a rejection of the preview, indicating a collection of alternate safe regions for presenting the secondary presentation; and in response to an alternate safe region among the collection of alternate safe regions being selected, displaying the secondary presentation in the selected alternate safe region.
摘要:
Embodiments of the present invention allow the prevention and/or mitigation of damage caused by server failure by predicting future failures based on historic failures. Statistical data for server parameters may be collected for a period of time immediately preceding a historic server failure. The data may be clustered to identify cluster profiles indicating strong pre-fault clustering patterns. Real time statistics collected during normal operation of the server may be applied to the cluster profiles to determine whether real time statistics show pre-fault clustering. If such a pattern is detected, measures to prevent or mitigate server failure may be initiated.
摘要:
A method, apparatus, system, and signal-bearing medium that, in an embodiment, display a graphical representation of data that changes over time, create a region in the graphical representation, retrieve data from a database based on the region, and create a graphical representation of the retrieved data. In various embodiment, a profile is created and the data is retrieved based on the profile. The profile may include a schedule for retrieving the data, an identification of the region, an identification of a key, an identification of an x-axis, and an identification of a y-axis. In an embodiment, an union of multiple profiles is created, and data in the database that is not represented by the union is deleted. In another embodiment, regions that are adjacent in time are concatenated. In another embodiment, the creation of the graphical representation may be separated into multiple units of work for execution in a network if a workload at a computer exceeds a threshold.
摘要:
A method, apparatus, system, and signal-bearing medium that, in an embodiment, display icons representing search terms on a search graph, having at least one axis. The axis represents a search criteria. The position of the icon specifies a value (such as an importance or weight) of the search criteria. A search engine uses the search terms, the search criteria, and the value to conduct the search. The results of the search are displayed in a results pane, and the search results are updated as the positions of the icons on the search graph change. The search criteria associated with the axes of the search graph may also change. In this way, the user interface for the search is made easier for the user to control.
摘要:
A method, apparatus, system, and signal-bearing medium that in an embodiment count the number of times that a file or registry entry is added, changed, or deleted at clients in a network. If the count exceeds a threshold, then a warning is sent to the clients. The warning may prompt the clients to delete or rename the file or registry entry, run an anti-virus program, quarantine the file or registry entry, or issue a message. In this way, viruses may be detected at clients.