Abstract:
A system, method, and program product is provided that updates the firmware on a hybrid drive by reserving a memory area within the hybrid disk drive's nonvolatile memory buffer. The firmware update is then stored in the reserved memory area. The next time the platters of the hybrid disk drive spin up, the firmware update that is stored in the reserved memory area is identified. The identified update is then written to a firmware memory of a firmware that controls the operation of the hybrid drive. In one embodiment, the update is written to the firmware memory by flashing the firmware's memory. After the firmware is updated, the hybrid drive is reset. Resetting of the hybrid drive includes executing the updated firmware.
Abstract:
A call from a user operating system (UOS) to BIOS to configure a connected device into a reduced energy consumption mode is routed through a virtual machine monitor (VMM). The VMM determines whether a service O.S. (SOS) is in need of the device and if so the VMM informs the UOS that the device has been configured as ordered, while allowing the SOS to complete its task with the device. If the SOS is not in need of the device, or at the completion of the SOS task with the device, the VMM passes the call to ACPI/BIOS to configure the device in the demanded energy consumption mode.
Abstract:
An intelligent battery charger is disclosed which tracks usage of the computer by the user and the charging and usage habits of the user. This tracking includes dates, times, and elapsed usage time, as well as dates, times, and elapsed charging time. Parameters regarding the specific battery being charged are also known by the intelligent battery charger. This information is utilized to develop a usage and charging profile for a particular battery in the device for which it is used. To execute a deep cycle, rather than require that the user wait to plug in a charger until the battery level has reached a certain low level, the charger itself controls the on and off operation of the charging system, based on the profiles.
Abstract:
An area is established by positioning a string of boundary objects that are reflective to a range of ultrasonic frequencies. Tracking objects may be placed inside the area which also are reflective to the range of ultrasonic frequencies. An array of transducers insonify the area and the reflected signals are received by each transducer, digitized and stored as digital data. The digital data is read out in time reverse order and time reversal signals are generated that are coupled to each corresponding transducer. The time reversed signals focus energy on the reflective sources. The reflected signals resulting from the time reversed signals are analyzed to generate a reference signature indicating relative locations of boundary and tracking objects. The time reversed signals are sent intervals to generate new signatures which are compared to the reference signature to determine if tracking objects have been moved outside the area.
Abstract:
A method, system and computer program product for creating a preload. A preload may be stored onto a computer system prior to the computer system being manufactured. One or more attributes of an object of a preload may be defined. Each preload object may be an aggregation of one or more software element objects. A comparison may be made between the attributes in each software element object with the one or more attributes in the defined preload object. Upon identifying one or more software element objects whose attributes comprise the one or more attributes of the defined preload object, one or more part numbers associated with the one or more identified software element objects may be transmitted to a manufacturing system. Software associated with the identified one or more software element objects may be retrieved and installed onto a preload associated with the defined preload object.
Abstract:
A system and method for hybrid virtual machine monitor system is provided. A first operating system uses a file system to manage data storage and retrieval within a data storage area. A second operating system, which is not compatible with the first operating system's file system, executes a management application backup utility. The first operating system includes a filter driver that sends logical block addresses, which correspond to data reads/writes, to the management application backup utility. In turn, the management application backup utility uses the logical block addresses to perform operations on the data storage locations. In one embodiment, the management application backup utility performs actions on the data storage area, such as a disk defragmentation, and subsequently sends data location changes to the filter driver. In this embodiment, the filter driver instructs the first operating system's file system to update its translation tables based upon the data location changes.
Abstract:
When a contact in an electronically-stored phone book has more than one telephone number associated with the contact's name, a user is permitted to define times (and if desired day/dates) for which each number is to serve as the default number for the contact, so if the user selects the contact's name from a list or enters the contact's speed dial shortcut number, the number called by default changes depending on the time of day/date.
Abstract:
A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
Abstract:
The number of concurrent instant messaging sessions at a given time is limited. A user may configure the number of instant messaging sessions that are allowed at a given time. When a new request for an instant messaging session is received, a determination is made as to whether there are already the maximum number of allowed sessions. If the maximum number of sessions has been reached, the requestor receives a message indicating that the user is currently busy with other instant messaging sessions and inviting the requestor to join the queue. If the requestor joins the queue, then the requestor moves up in the queue when one of the user's instant messaging sessions terminate.
Abstract:
A system and method that gathers activity level from users and provides a “busy gauge” to others that indicates the user's activity level. In one embodiment, the user's activity is computed automatically based upon the user's interaction with their computer system. In the automatic method, an input tracking routine records the user's input frequency, such as mouse clicks, voice inputs, keyboard inputs, and other inputs in order to determine the user's activity level. The recorded activity data is compared with activity level thresholds that can be either default thresholds or user-specified. The user can select to use a manual input level in which the user specifies the user's activity level despite the number of input actions received at the user's computer.