摘要:
A network security module for protecting computing devices connected to a communication network from identified security threats communicated in a secured communication is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. Upon detecting a secured communication, the network security module obtains a decryption key from the computing device to decrypt the secured communication. The network security module then processes the decrypted communication according to whether the decrypted communication violates protective security measures implemented by the network security module.
摘要:
Described is a technology by which a computing device is booted into a normal mode of operation or a limited mode of operation, depending on whether the computing device was operating correctly (e.g., with respect to policy) prior to a reboot. The reboot may be forced. Examples of incorrect state include an overdue payment on a leased computer, or improper execution of certain important software. A metering mechanism evaluates the state of the computing device, and when an incorrect state is detected, configures the computing device for operation in the limited mode, by setting the computing device to boot via one boot path (e.g., a limited-mode BIOS) instead of another boot path (e.g., a normal-mode BIOS). A BIOS selector switches to the limited BIOS on the next reboot, wherein the computing device is restricted to the limited mode of operation (regardless of subsequent reboots) until the correct state is restored.
摘要:
A computer is provided with an isolated computing environment. The isolated computing environment is adapted to allow initial programming for use in manufacturing, distribution and sales. The isolated computing environment further allows an authenticated source or authenticated code to update the isolated computing environment with code and configuration data for use in the end-user environment. To encourage final updating, the computer may be placed in a limited-function mode until authorized code is installed and operational. A method and apparatus are disclosed for the sanctioning and secure update of the isolated computing environment.
摘要:
Technologies for transient personal preference customization of environments, devices and systems based on user preference data. Such technologies enable users to maintain personal preference data on mobile or other devices, such as cell phones, personal data assistants (“PDA”), or the like, such that the data can be transferred to devices and systems capable of conforming parameters under their control to the preferences expressed in the data. For example, a frequent traveler may define preferences regarding room temperature, ambient lighting, music style, and the like and maintain these preferences in a mobile device such as a cell phone. Upon arrival at a hotel room, for example, the systems of the hotel may access the preference data and adjust the parameters of the room, and the devices and systems in the room, to conform to the user's preferences while the user is in the room or checked into the hotel. Such customization may be transient in that parameters may be returned to a default or other setting once a user is no longer present, or when another user is present.
摘要:
A system and method for maintaining persistent data during an unexpected power loss uses a memory controller and a supplemental power source. An entity running on the computer, for example, an application program, a utility, the operating system or other entity, may identify data for preservation using an application program interface. The application program interface may be provided by the memory controller. A sensor determines when an unexpected power loss has occurred and signals the memory controller. Using power from the supplemental power source, i.e. a battery or capacitor, the memory controller copies the identified data to a non-volatile memory. The memory controller may set a flag to indicate that preserved data is available for later recovery.
摘要:
Techniques are described which provide an independent computation environment. The independent computation environment is contained at least in part in a set of one or more hardware components and configured to host a provisioning module that is executable to provision functionality of the computing device according to a wide variety of factors. In an implementation, when the provisioning module determines that particular functionality is referenced in an inclusion list, the computing device is permitted to access the particular functionality. When the provisioning module determines that the particular functionality is referenced in an exclusion list, the computing device is prevented from accessing the particular functionality.
摘要:
Described is a technology by which a computing device is booted into a normal mode of operation or a limited mode of operation, depending on whether the computing device was operating correctly (e.g., with respect to policy) prior to a reboot. The reboot may be forced. Examples of incorrect state include an overdue payment on a leased computer, or improper execution of certain important software. A metering mechanism evaluates the state of the computing device, and when an incorrect state is detected, configures the computing device for operation in the limited mode, by setting the computing device to boot via one boot path (e.g., a limited-mode BIOS) instead of another boot path (e.g., a normal-mode BIOS). A BIOS selector switches to the limited BIOS on the next reboot, wherein the computing device is restricted to the limited mode of operation (regardless of subsequent reboots) until the correct state is restored.
摘要:
An optical instrument has an outer shank (15) with a viewing window (31) arranged near the free shank end and a handle part (1) at the other end of the outer shank. An opto-electrical a transducer (26) is rotatably arranged within the outer shank, and is attached on an inner shank (12) which is rotatably mounted within the outer shank. Actuation means (10) for rotating the transducer (26) are provided in the outer shank. An axial bearing is provided between the outer shank and the inner shank (12). Moreover, a spring element impinging the inner shank (12) with force in the direction of the axial bearing is provided.
摘要:
Computer executable modules and an associated method for delivering computer resources using an advertising based model may use a local database of advertisements and locally collected user profile data for selecting targeted advertisements for delivery to a user. A user may be allowed to select what or how much user profile information to share with an advertising provider. The local database of advertisements may then be downloaded corresponding to the amount of user profile data shared. For example, when less user profile data is shared a larger database of advertisements may be downloaded. The advertising database may also be attached to a software update. Presentation of targeted ads may be verified and reported to an advertising provider allowing revenue-sharing to compensate the computer resource provider.
摘要:
A system for simultaneous monitoring of a plurality of individuals including an individual physiological data logger (IPDL) for each individual for measuring and storing heart beat data, the IPDL including: an electro-cardiogram (ECG) measuring device for providing heart beat data, an extended memory for storing the measured heart beat data, a synchronization element, a micro-controller including a synchronization element controlling circuit, and RF transceiver apparatus; a central interface unit selectably couplable by radio telemetry communication to each IPDL for transmitting thereto a plurality of commands and for receiving therefrom the heart beat data; and a computer coupled to the central interface unit for providing commands for each IPDL, for performance of an individual bench test for deriving a conversion coefficient of heart beat cost per unit of mechanical work, and for monitoring and analyzing, in real time, the heart beat data of each of the plurality of individuals.