Abstract:
Systems and methods for controlling access to a private partition on a storage device are disclosed for. An example system includes a token reader that detects a hardware token storing a private key and obtains the private key stored on the hardware token. The system also includes a partition controller that determines whether the private key unlocks a private partition on a storage device. In response to determining that the private key unlocks the private partition, the partition controller unlocks the private partition on the storage device. The private partition is invisible to an operating system executing in the computer system when the private partition is locked.
Abstract:
Systems and methods are disclosed for providing a representation of a stack trace. An example method includes identifying an element in a stack trace. The stack trace is generated based on an occurrence of an event during execution of an application. The method also includes determining whether the element has an associated annotation. The annotation is an indication to translate the element's name from a first language to a second language. The method further includes in response to determining that the element in the stack trace has the associated annotation, obtaining the element's translated name and updating the stack trace to include the element's translated name, which is in the second language.
Abstract:
A method and system for automatic ESB deployment at the level of individual services is described. In one method, a load balancer repeatedly monitors performance of individual services installed on ESB nodes. The performance is measured in view of utilization metrics of the individual services. The load balancer periodically determines whether the performance of one or more of the individual services falls below a performance threshold and deploys duplicate services for the one or more of the individual services that falls below the performance threshold at one or more additional ESB nodes without user intervention in response to the periodically determining.
Abstract:
A method includes receiving a voice command, determining, by a processing device, a first loudness parameter associated with the voice command, generating a voice response to the voice command, and determining a target loudness parameter associated with the voice response in view of the first loudness parameter associated with the voice command.
Abstract:
A system and a method are disclosed for self-organizing ad-hoc workflow. In one implementation, the present disclosure describes a self-learning system that monitors input conditions and monitors user steps in executing the ad-hoc workflow. When a new user executes the ad-hoc workflow process, the system receives a group of values for a set of input parameters, determines whether the received group of values has a matching group of values in a database, locates groups of values in the database with at least one matching value of the received group of values, determines a closest match between the received group of values and the located groups of values in the database using importance weights of input parameters in the set of input parameters, and selects the workflow associated with the closest match of the received group of values.
Abstract:
A device includes a processor and a memory comprising machine readable instructions that when executed by the processor, cause the system to display information to a user through a display screen of the device, the display screen being positioned on a front side of the device, receive a first input from a first sensor placed on a left side of the device, the first input indicating a placement of at least one appendage along the first sensor, receive a second input from a second sensor placed on a right side of the device, the second input indicating a placement of at least one appendage along the second sensor, and execute a predefined function within an application running on the device, the predefined function being based on both the first input and the second input.
Abstract:
A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. The debugger then receives a second debugging command, where the second debugging command triggers a second instruction in the reactive application to continue execution of the reactive application. Responsive to the execution of the reactive application being continued, clocking of the substitute clock is continued.
Abstract:
An example method of preserving a modification to an internal state of a computer system includes applying an overlay on a target container. The overlay includes a set of events corresponding to a first set of modifications to a computer system. The method also includes after applying the overlay, receiving a set of user requests corresponding to a second set of modifications to the computer system. The method further includes changing, based on the set of user requests, the third set of internal states of the computer system to the fourth set of internal states. The method also includes removing the overlay from the target container, while preserving the second set of modifications to the computer system.
Abstract:
A system includes a processor and a memory comprising machine readable instructions that when executed by the processor, cause the system to receive command line instructions associated with execution of a Java virtual machine, the command line instructions associated with a set of rules for switching the Java virtual machine to a debugging mode, start execution of the Java virtual machine, start execution of an application on the Java virtual machine in a standard mode, during execution of the application, detecting an event that triggers a rule within the set of rules, and in response to the event, automatically switching the Java virtual machine from the standard mode to the debugging mode.
Abstract:
An example method of providing data to an application running on a mobile device includes receiving a request from a first application to activate a camera interface. The method also includes switching the mobile device into an application selection mode and displaying a set of applications on the display of the mobile device. The method further includes detecting a first input selection of a second application and displaying a document on the display of the mobile device. The document is associated with the second application. The method also includes detecting, while the document is displayed on the display, a second input selection of a user selectable option to activate a software camera of the mobile device. The method further includes capturing a screenshot of the document displayed on the display in response to detecting the second input selection. The method also includes providing the captured screenshot to the first application.