摘要:
An apparatus, system, and method for deliberately preventing unauthorized access to data stored in a non-volatile memory device are disclosed. In one embodiment, an apparatus is configured to destroy the data stored on the memory device. The apparatus may comprise a printed circuit board (PCB), a non-volatile memory circuit electrically connected to the PCB, and a housing of the PCB. The non-volatile memory circuit may be scored to facilitate deliberately breaking the non-volatile memory circuit in response to an external force. In a further embodiment, the apparatus may comprise an electrical erase circuit powered by a power source connected to a switch. The electrical erase circuit may be configured to non-destructively erase the non-volatile memory circuit in response to activation of the switch. The system may further include a leverage tool configured to provide leverage to a non-volatile memory device affected by an external force.
摘要:
A method, system and computer program product for generating an alternative form of transmitted environmental data, e.g., scent information, air temperature settings, air humidity settings, triggering of infrared devices such as to create tactile warmth. Upon identifying one or more environmental data files in a received file, e.g., HTML file, environmental data associated with the data files may be read and interpreted. If there are no environmental devices, e.g., smell-generating device, configured to emit a response to the environmental data or if the environmental devices are disabled from emitting a response to the environmental data, then the environmental data may be translated into a form a computer may be capable of reproducing. The translated form may then be outputted in a variety of forms such as: pictorial data (e.g., picture of a pine tree substituting a pine smell), graphical effects (e.g., screen-flashing effect may substitute a strobe-light trigger).
摘要:
A web browser program presents historical information about hyperlinks shown on web pages. Initially, the computer determines whether it is receiving certain user input, such as placement of a cursor over a hyperlink for a certain time. When this occurs, the computer accesses a database to determine whether one or more users in a predefined access group have previously selected the hyperlink for the purpose of downloading underlying data represented by the hyperlink. Some examples of the underlying data include web pages, graphics images, software programs, and the like. If the hyperlink has not been previously selected, no action needs to be taken. However, if the database shows that the hyperlink has been previously selected, the computer consults the database to gather characteristics of the underlying data obtained from previous selections of the hyperlink by access group members. Such characteristics may include, for example, the data's size, date of last download, expired or “under construction” status of web site, errors occurring during the download, etc. The computer presents a report containing the characteristics gathered from the database.
摘要:
A hand held pointing device for use with a computer system having a graphic interface. The pointing device includes a body, and a communications device within the body for communicating movement signals to the computer system. The pointing device further includes a movement detection device within the body, coupled to the communications device, for detecting movement of the body by a computer user. The pointing device additionally includes a pliant outer shell having at least a portion of the body which dynamically conforms to a computer user's hand when the pointing device is held and manipulated by a computer user, such that the portion of the body which conforms to the computer user's hand provides comfort and efficient ergonomic cushioning to the computer user during computer system pointing device activities. The pointing device further includes at least one user input device for transferring data to the computer system via the pointing device. In addition, the pointing device includes an interior shell which prevents the portion of the body from contacting interior electronics located within the pointing device. The pliant outer shell may also be surrounded by a membrane for preventing the rupture of the portion of the body. The pliant outer shell portion of the body may be composed of a gel based on an elastomer compound. Liquid-crystal material, controlled by a host computer, can also be located on the exterior of the pointing device to provide visual feedback to the computer user.
摘要:
Using a graphical user interface (GUI), users manipulate, organize, classify, and/or arrange icons by having the icons bind (stick) to one another and be moved as aggregates. Icons sticky sites may be on icons, windows, or other graphical objects. For example, when an icon with a sticky site is dragged close to another icon with a sticky site, the icons bind together and are subsequently moved as one graphical unit. In some embodiments, a visual indication or binding is given. The icons may be unbound by pointing to an unbinder icon, or using a button sequence on the mouse of keyboard.
摘要:
Re-arranging data handling in a computer-implemented system that comprises a plurality of existing physical entities. At least one reliability rating is assigned to each of various existing physical entities of the computer-implemented system; and in response to change. Reverse predictive failure analysis uses the assigned reliability ratings to determine cumulative reliability rating(s) for at least one arrangement of the system. Data handling is re-arranged with respect to at least a portion of the existing computer-implemented system to provide a designated cumulative reliability rating.
摘要:
Method, computer program product and apparatus for physically securing a server in response to detecting an unauthorized intrusion event. The method comprises detecting an unauthorized physical intrusion event to a data center, rack or chassis including a plurality of servers, communicating the detected unauthorized intrusion event to a management module that manages the plurality of servers, and automatically physically securing one or more of the plurality of servers against manual removal. Optionally, the step of physically securing may include disabling one or more front panel controls on the plurality of servers, such as a physical power switch. In a further option, the step of physically securing may include disabling one or more external ports on the plurality of servers, such as a keyboard-video-mouse port. A preferred method allows the one or more physically secured servers to continue to operate.
摘要:
One embodiment provides a flow meter including an airfoil movably secured in the airflow path of a fan in an electronic system. The airfoil is configured to generate a lift component in response to the airflow. A sensor engages the airfoil and generates a signal in relation to the movement of the airfoil. Airflow parameters such as volumetric airflow rate and turbulence may be identified by an analysis of the movement of the airfoil.
摘要:
A ballistic logic gate is disclosed. The ballistic logic gate may include an etched silicon substrate with a pair of etched silicon triangular baffles defining input channels. An electron may travel through the input channels toward a nano-deflector with a parabolic deflection surface. The parabolic deflection surface may guide electrons into a fixed path of an output channel toward an output terminal for performing a logic function.
摘要:
Method and computer program product for recommending cost effective upgrades for a computer system. At least one performance parameter is determined for an existing computer system. Up to date performance specifications for available upgrade components are obtained. A variety of potential systems are modeled utilizing at least one upgrade component, and at least one component from the existing system to create upgrade scenarios. At least one performance parameter is predicted for each upgrade scenario. The performance parameters for the upgrade scenarios are compared to the performance parameters of the existing computer system. The cost-effectiveness is determined for each upgrade scenario, and upgrade recommendations are made when the cost-effectiveness meets or exceeds a target value.