摘要:
Systems and methods that provide for voice command devices that receive sound but do not transfer the voice data beyond the system unless certain voice-filtering criteria have been met are described herein. In addition, embodiments provide devices that support voice command operation while external voice data transmission is in mute operation mode. As such, devices according to embodiments may process voice data locally responsive to the voice data matching voice-filtering criteria. Furthermore, systems and methods are described herein involving voice command devices that capture sound and analyze it in real-time on a word-by-word basis and decide whether to handle the voice data locally, transmit it externally, or both.
摘要:
An apparatus and method are presented for a maximum speed criterion for a velocity gesture. The apparatus includes a processor, a memory, a determination module and a transmission module. The determination module determines, through a wireless communication infrastructure mode, an amount of wireless network activity. The transmission module sets a rate of data transmission in a peer to peer mode based on the amount of wireless network activity.
摘要:
An apparatus for distance-based network resource discovery includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a distance between an information handling device and a network resource capable of communication with the information handling device. The machine readable code also includes a policy module following a discovery policy according to the distance. The discovery policy is associated with discovery of the network resource.
摘要:
An apparatus, system, and method are disclosed for computer system power management. A control module 602 is activated on a computer 200 in response to an event and enters 818 a standby state if the computer 200 is not already 814 in the standby state. A policy module 604 detects 904 a power source of a predetermined type connected to the computer 200 and dictates 908 one or more processors 302 of higher power consumption for a more abundant type of power source such as an AC adapter 314, or one or more processors 304 of lower power consumption for a less abundant type of power source such as a battery 318. A configuration module 606, activated by the control module 602, switches 1004 the computer 200 to one or more processors 302 and 304 of a predetermined power consumption as dictated and exits 1016 the standby state.
摘要:
An approach is provided that uses a foldable transformable display case that includes two panels. The two panels are attached using a hinge. Two components are attachable to at least one of the panels. One of the two components is an integrated display screen. Another component is a keyboard unit. At least one of the components can be removed from the panels.
摘要:
The present invention adds a procedure to the operating system file subsystem of a processing system that significantly reduces the amount of time necessary to verify the validity of executable files. Each executable is extended with a file signature containing a header containing validation data. This header may be added to an existing ELF header, added as a new section, or placed in a file's extended attribute store. The header contains results of all previous validation checks that have been performed. The file signature is inserted, with a date stamp, into the file attributes. On execution, the system checks the previously-created file signature against a current file signature, instead of creating the file signature for every file during the execution process. Checks to ensure that the file signature is secure, and is valid and up to date, are also implemented. Only if the file signature is not valid and up-to-date does the execution program create a new file signature at the time of execution.
摘要:
A method and system for remotely isolating faults in computer network devices coupled to a computer network. A plurality of first computer units are coupled to the computer network. The plurality of first computer units are located on a user side of the computer network. A plurality of second computer units are coupled to the computer network. The plurality of second computer units are located on a service provider side of the network. One of the plurality of second computer units is designated to provide computing services to one of the plurality of first computer units. One of the plurality of first computer units experiencing a fault communicating with its designated second computer unit uses another of the plurality of first computer units as a proxy computer unit to remotely isolate the fault.
摘要:
A method, computer program product and system for reducing the boot time of a client device in a client device/data center environment. A profile of the client device, which includes information regarding the usage characteristics of the client device, may be created. A confidence level indicating the likelihood that the client device is going to be booted may be determined based on the client device's profile. The confidence level and the utilization of the resources of the server blades in the data center may be examined in determining whether to have an appropriate server blade perform an action involved in booting the operating system of the client device. If the appropriate server blade performs such an action, e.g., pre-booting the client device's operating system, prior to the user of the client device attempting to boot its operating system, then the boot time may be reduced.
摘要:
A method and system for booting up multiple PCI peripheral devices, such that the number of bootable PCI peripheral devices is not limited by the amount of computer system memory that is dedicated to storing executable boot code for the peripheral devices. The executable boot code is stored on a Read Only Memory (ROM) on each peripheral device. When a new PCI peripheral device begins to boot up, a check for available memory space in a ROM scan memory address space is performed. If there is not enough available room in the ROM scan memory address space for the new device's executable boot code, then a ROM scan detection logic pages an image of another peripheral device's executable boot code out of the ROM scan memory address space before storing the new device's executable boot code into the ROM scan memory address space.
摘要:
Systems and methods to access password-protected stored data when a corresponding data password has been lost, forgotten, or is otherwise unavailable, and to recover the data password to facilitate access to the password-protected data from a digital memory device such as a hard disk drive associated with a user computer. In some embodiments the computer is communicatively coupled with a network and receives at least one encryption key from a secure computer via the network. In other embodiments the computer is a stand alone computer and receives at least one encryption key from a removable, non-volatile memory such as a CD ROM. The encryption key is used to encrypt the data password and both are stored on the hard disk drive. If the data password becomes lost, forgotten, or otherwise unavailable, the encrypted password is recovered from the hard disk drive and decrypted to recover the data password.