摘要:
This patent application pertains to urgency-based resource management in computing scenarios. One implementation can identify processes competing for resources on a system. The implementation can evaluate an urgency of individual competing processes. The implementation can also objectively allocate the resources among the competing processes in a manner that reduces a total of the urgencies of the competing processes.
摘要:
Code information is marked by tags and tags are embedded into pieces of code or files called “codetags” that map tags to pieces of code. These tags can then be updated, searched, sorted, recombined, and tracked, among many other feedback mechanisms. These tags and their feedback mechanisms help to illuminate the engineering metadata and business metadata of pieces of code so as to help engineering management and business management of companies to better guide their software resources.
摘要:
The present invention manages resources in a computing device to facilitate the allocation of resources amongst competing clients operating on the device. A hierarchy of budgets is constructed to encode restrictions on the aggregated use of a resource allocated by a resource provider to one or more clients. A resource manager validates and arbitrates requests to allocate resources to the one or more clients by resource providers in accordance with the budgets comprising the hierarchy. The resource manager notifies clients of availability and shortages of resources to promote compliance with the restrictions encoded in the budgets of the hierarchy.
摘要:
Granting an executable object (e.g., an application program, thread, or process) access to a namespace object (e.g., a named object, resource, file, or folder). A request by the executable object for the namespace object is intercepted and processed to determine whether a local namespace associated with the executable object, user, or session stores a copy of the requested namespace object. If the copy exists in one of the local namespaces, the request is granted and allowed to operate on that local namespace. If the requested namespace object exists only in a global namespace, the namespace object is copied to a local namespace. The request is then granted and allowed to operate on the copy of the namespace object in the local namespace. Protecting the namespace objects stored in the global namespace from modification improves the stability of the application program and operating system.
摘要:
Tracking creation of one or more files by an application program or operating system. A method of the invention dynamically maintains a list of files or other resources associated with a particular application program or operating system. The method maintains the list by detecting creation of a file, determining an identity for the file, identifying a list associated with the file identity, and adding the file to the list.
摘要:
An electronic device with emergency instructions to instruct a user how to handle a variety of medical as well as non-medical emergencies, and the instructions are electronically resident on the electronic device. The electronic device will generally be a device generally used for many different tasks such as telecommunication or planning. Finally the instructions may be installed during the device's manufacture or after the device's manufacture. The instructions may be accessed at any time and anywhere because they are resident upon the device.
摘要:
This patent application pertains to urgency-based resource management in computing scenarios. One implementation can identify processes competing for resources on a system. The implementation can evaluate an urgency of individual competing processes. The implementation can also objectively allocate the resources among the competing processes in a manner that reduces a total of the urgencies of the competing processes.
摘要:
A system and method for identity decisions and invalidation. Modified objects (e.g., files, executables, etc.) are flagged for reevaluation. Privileges associated with the object are only persisted if the modifications are determined to be authorized (e.g., updates and patches). In one embodiment, a tagging system registers to be notified of all writes, renames, truncations, moves, deletions, or any other relevant modifications to objects. If the tagging system detects a modification operation targeting the object, it invalidates all identity decisions cached with the object. The next time the object runs, the system does not recognize the object and it is forced to reevaluate its identity. Thus, patching and other write operations are still permitted, but the system detects the changed object and reevaluates the identity.
摘要:
A disinfectant solution comprising: an aldehyde; a polyol; one or more acetal derivatives formed by reaction of said aldehyde with said polyol; one or more surfactants selected from the general classes anionic, cationic, or non-ionic; one or more pH buffering agents selected from the group consisting of monosodium phosphate, disodium phosphate, trisodium phosphate, sodium tetraborate, sodium bicarbonate, sodium citrate, phosphoric acid, boric acid and citric acid. The invention also relates to a process of producing the disinfectant solution, and a method of disinfecting and/or sterilizing heat sensitive medical devices comprising treating the medical devices with the disinfectant solution of the invention.
摘要:
Granting an application program access to a resource as a function of a privilege associated with the application program. An embodiment of the invention employs a persistent, individual identity associated with the components of an application program or a group of application programs to allow an operating system to identify and differentiate between different application programs or groups of application programs installed on a computing system. The identity associated with each component of an application program enables the identification and removal or uninstallation of the application program. The identity also enables isolation of resources of the application program and protection of operating system resources.