摘要:
A probe or accessory incorporating the features of the subject invention includes a communications arrangement for communicating topology-related data to a host instrument connected to the probe or accessory. The topology-related data describes the probe or accessory as a network comprising multiple paths from the probe tip to host instrument input connector. Each path is associated with a feature of the probe or accessory, and only one path may be active at any given time. Each feature is described by a unique number, called a “tag”. New tags may be assigned when necessary so long as existing tags are not disturbed. A probe or accessory in accordance with the subject invention transmits a list of “Required Tags” to the host instrument. Each required tag is associated with a pathway within the probe or accessory. The host instrument may only exercise those paths for which all required tags are understood, or those for which no required tag is designated. Tags which are not understood by the host instrument, but which also do not appear in the required tags list, are to be ignored by the host instrument.
摘要:
In some embodiments, the invention involves a framework for using virtualization technology to efficiently support a domain-specific run-time environment. In at least one embodiment, a framework is utilized to take advantage of virtualization technology (VT) to partition performance critical and non-performance critical tasks of the same domain-specific application. An embodiment of the invention utilizes a general-purpose operating system to execute non-performance critical aspects of a domain, and uses a privileged VT-root mode to execute performance critical aspects of the domain. Another embodiment uses one or more guest VMs to execute the performance critical aspects of the domain-specific run-time environment. Other embodiments are described and claimed.
摘要:
Systems, devices, and methods for proximity-based parental controls include a dominant computing device and a subordinate computing device configured to pair and establish a shared secret. Later, upon determining that the dominant computing device and the subordinate computing device are in proximity, the dominant computing device authenticates the subordinate computing device using the shared secret and authorizes access to an application on the subordinate computing device. The dominant computing device may configure an access control policy associated with the application. The access control policy may define allowed usage time, allowed usage time of day, allowed content, and/or other parameters. The subordinate computing device may enforce the access control policy. The application on the subordinate computing device may be a user interface shell, a game, a web browser, a particular web site, or other application. Other embodiments are described and claimed.
摘要:
In some embodiments, the invention involves a framework for using virtualization technology to efficiently support a domain-specific run-time environment. In at least one embodiment, a framework is utilized to take advantage of virtualization technology (VT) to partition performance critical and non-performance critical tasks of the same domain-specific application. An embodiment of the invention utilizes a general-purpose operating system to execute non-performance critical aspects of a domain, and uses a privileged VT-root mode to execute performance critical aspects of the domain. Another embodiment uses one or more guest VMs to execute the performance critical aspects of the domain-specific run-time environment. Other embodiments are described and claimed.
摘要:
A business process software program is executed in a processing element comprising a memory and a processor coupled to the memory. The processor is operative to identify within the software program one or more communications services inserted as generic design elements therein, and for each of the identified communications services, to initiate the execution of one or more corresponding communications tasks. At least one of the communications services may comprise a composite communications service which itself comprises a plurality of communications services.
摘要:
Human presence techniques are described. For instance, an apparatus may comprise one or more physical sensors operative to monitor one or more physical characteristics of an electronic device, and a security controller communicatively coupled to the one or more physical sensors. The security controller may be operative to control security for the electronic device, the security controller comprising a human presence module operative to receive a request to verify a presence of a human operator, determine whether the human operator is present at the electronic device based on sensor data received from the one or more physical sensors for the electronic device, the sensor data representing one or more physical characteristics of the electronic device, and generate a human presence response indicating whether the human operator is present or not present at the electronic device based on the sensor data. Other embodiments are described and claimed.
摘要:
A system for controlling the presence of a user perceived by contacts is provided. In particular, a rules engine receives a number of inputs related to the desired accessibility of the user, and from such inputs generates a perceived presence for the user that can be used to control how the user is notified of an incoming communication. Inputs may include an accessibility rating assigned to a contact, the physical presence of the user, the user selected desired accessibility level, and environmental factors. The system allows a user to limit distractions from unimportant contacts or while the user is engaged in other tasks, while allowing more important contacts to have immediate access to the user.
摘要:
In general, in one aspect, the disclosure describes a method of determining if a first query for data related to a protocol data unit in a first table is a query to a table merged into a combination table formed from multiple tables. If so, the method can generate a second query for the first query for data stored by the combination table.