Abstract:
A card formed with a cavity located within the card. The cavity is used to hold one or more liquid chemicals. Additional hollow regions abut the visual and magnetic versions of the sensitive data and are normally separated from the chemicals. When the card is sharply folded, the chemicals are released from the cavity and flow in the hollow regions abutting the stored data. The chemicals render the data unreadable, such as by obscuring the visual display with an opaque film. Additionally, in at least some embodiments, the magnetic strip on the credit card is implemented in such a way that there are two separate portions, with the encoded data divided in such a way that both portions are required in order to be decoded.
Abstract:
The present invention relates to a method for removing the driver map component from being stored on the service partition and placing it on a server for retrieval at a later time. Only the actual device drivers that are required for that system will be provided. A central repository will be provided for applications and device drivers that would leverage the AMT area. The AMT IDE-R would be used to store the hook to network install, for example an IT administrator initiated network install to an unpowered system. Two situations exist in which this method will be used. The first situation involves supplying ImageUltra content to a system that is connected to the Local Area Network while ImageUltra is running. The second situation involves supplying ImageUltra content to a system that is not connected to the Local Area Network while ImageUltra is running.
Abstract translation:本发明涉及一种用于将驱动程序映射组件移除存储在服务分区上并将其放置在服务器上以便稍后进行检索的方法。 仅提供该系统所需的实际设备驱动程序。 将为使用AMT区域的应用程序和设备驱动程序提供中央存储库。 AMT IDE-R将用于存储钩子到网络安装,例如IT管理员启动网络安装到无动力系统。 存在使用这种方法的两种情况。 第一种情况是在ImageUltra运行时将ImageUltra内容提供给连接到局域网的系统。 第二种情况是在ImageUltra正在运行时,将ImageUltra内容提供给未连接到局域网的系统。
Abstract:
A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
Abstract:
Systems, methods and products directed toward creating device preloads via employing base and additional operating system content. One aspect includes communicating an aspect of an information handling device, and assimilating additional operating system content at the information handling device responsive to communication of the aspect of the device, the additional operating system content deriving from a repository separate from the information handling device, wherein a base operating system and additional operating system content combine to form a unitary device operating system. Other embodiments are described herein.
Abstract:
Devices, methods and products are described that provide for selective system or root level access for applications on an information handling device. One aspect provides a method comprising determining whether an application has system privileges on an information handling device; and executing privileged code from the application on said information handling device responsive to determining that the application has system privileges through one or more native services operating on said information handling device. Other aspects and embodiments are also described herein.
Abstract:
Systems, methods and products are described that provide a dock for favorite applications. One aspect includes providing a dock point on a display device of an information handling device; responsive to user input associated with said dock point, launching a utility organizing a sub-set of user applications installed on said information handling device in a predetermined arrangement of launch points; providing an animated movement of said launch points in said utility responsive to user input; and responsive to user input selecting a launch point in said utility, launching an application associated with said launch point on the information handling device. Other embodiments are described.
Abstract:
Embodiments of the invention provide systems, methods, apparatuses and program products configured to intelligently manage sound options for applications of a computer system based on display device characteristics. Various embodiments of the invention are particularly well suited for optimizing the sound options of two or more applications running on two or more display screens of the computer system simultaneously.
Abstract:
A method for preventing malicious software from execution within a computer system is disclosed. Before any actual execution of an application program on a computer system, the application program needs to be cross-compiled to yield a set of cross-compiled code of the application program. The set of cross-compiled code of the application program can then be executed in an execution module that is capable of recognizing and translating the set of cross-compiled code of the application program to the actual machine code of the processor.
Abstract:
An apparatus for managing a data rate based on an amount of available data for a predetermined time period includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a target data rate for data communication over a network by a network device. The target data rate is based on an amount of available data for a predetermined time period and an amount of time remaining in the predetermined time period. The machine-readable code includes a data rate module maintaining the data rate at or below the target data rate in response to the determination module determining the target data rate.
Abstract:
An apparatus, system, and method are disclosed for managing network bandwidth. A monitor module monitors traffic of a plurality of peer computers over a Transmission Control Protocol/Internet Protocol (TCP/IP) network. A detection module detects traffic exceeding a traffic threshold for the network. A delay module delays issuing each TCP/IP acknowledge signal for a specified delay interval in response to detecting the traffic exceeding the traffic threshold.