摘要:
In some embodiments, a filter may filter web graphics library code executing on the graphics processing unit. As a result the web graphics library code may be prevented from accessing memory or other resources that are not allocated specifically for the web graphics library module. Likewise web graphics library code may not access any shared resources that have been explicitly assigned to the process specific web graphics library module.
摘要:
Disclosed is a high molecular weight polylactic acid synthesized by using a method for synthesizing and catalytically-polycondensing bionic creatinine-guanidinium chloride. Creatinine is used as the material in a reaction with aqueous hydrochloric acid to synthesize a bionic creatinine-guanidinium salt catalyst, creatinine-guanidinium chloride (CR.Cl). The creatinine-guanidinium chloride synthesized is used as a catalyst, an industrial grade lactic acid (LA, 85% to 90%, aqueous solution) is used as a monomer, a solvent-free two-step polycondensation method is used to synthesize and afford metal-free and toxic residue-free polylactic acid featuring high biological safety and high molecular weight.
摘要:
Glass compositions are provided that are useful in a variety of applications including, for example, electronics applications, reinforcement applications, and others. Some embodiments of glass compositions can provide desirable dielectric constants, desirable dissipation factors, and/or desirable mechanical properties while also having desirable fiber forming properties.
摘要:
A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system. The client device may also perform a local security analysis after receiving the cloud service system's recommendation.
摘要:
An exemplary electronic device includes a casing with a slot defined in an outer face of the casing, a through holed defined in the slot, and a switch module. The switch module includes a switch received in the casing, and a slidable button embedded in the slot. The slidable button includes an operating portion received in the slot and abutting an outer face of the casing, a holding portion extending outwardly from the operating portion and through the through hole, and two elastic arms respectively extending outwardly from two lateral sides of the holding portion. Each elastic arm includes a connecting section extending outwardly from the holding portion and a locking section protruding outwardly from the connecting section towards the operating portion. The locking sections of the elastic arms abut an inner face of the casing, whereby the slidable button is fixed to the casing.
摘要:
A method is disclosed. The method includes receiving color data for an object to be printed and performing post color processing for each pixel in the object if the object is a graphics/text object, while no processing is performed if the object is an image object. Post color processing is performed by determining if a pixel is black or gray and converting the pixel to K only black color if the pixel is black or gray.
摘要:
An electronic device includes an EMI shielding board, two electronic components and a flat cable. The EMI shielding board includes a first side and a second side opposite to the first side. The two electronic components are arranged at the first side of the EMI shielding board. The flat cable is connected between the two electronic components. The EMI shielding board further includes a first through slot and a second through slot both configured therein. The flat cable passes through the EMI shielding board via the first and second through slots. A part of the flat cable is on the first side of the EMI shielding board, and the remaining part of the flat cable is on the second side of the EMI shielding board.
摘要:
An exemplary electronic device includes a shell, a mother board and a metal sheet disposed at an inner side of the shell, an electronic apparatus fixed on the mother board, and a heat conducting plate thermally connecting the electronic apparatus with the metal sheet. The metal sheet is located between the shell and the mother board to shield electro magnetic interference from the electronic apparatus. The electronic apparatus generates heat when working. The electronic apparatus is located between the mother board and the metal sheet, and is spaced from the metal sheet.
摘要:
An exemplary electronic device includes a cover, a motherboard and a driving module both disposed at an inner side of the cover, an electronic component fixed on the motherboard, and a fan duct mounted on the motherboard and covering the electronic component. The driving module has a rotating shaft for supportively driving an optical disk rotating. The fan duct guides hot air therein toward the driving module.
摘要:
Machine-readable media, methods, apparatus and system for a community-based trust are provided. In an embodiment, it may be determined whether a requesting node obtains a trust from a targeting node through an endorsement from an intermediate node. If the requesting node obtains the trust through the endorsement from the intermediate node, an intermediate trust level that indicates how much the targeting node trusts the intermediate node may be obtained; and a new trust level that indicates how much the targeting node trusts the requesting node may be calculated based upon the intermediate trust level.