摘要:
Described is a method and system comprising solution modules that allow a user to compose a customized computer system configured according to a user's needs. Modules may be by simply coupling them to a base computer system. Each module contains the hardware that enables a base computer system to accomplish a limited computing task, along with supporting software that is loaded to enable the base computer system to operate the hardware. The present invention thus provides an additive model, in which each module contains one or more hardware components, drivers and application programs, operating system modules, middleware and/or services that allow a user to compose a custom computer system. Examples of solution modules include an Internet module comprising a NIC and supporting software, a module that augments a computer system with digital video recorder capabilities, modules for advanced graphics subsystems such as for games, and others.
摘要:
A network security system for protecting computing devices connected to a communication network from identified security threats is presented. A security service published security information intended for network security modules in the communication network. A network security module is interposed, either logically or physically, between a computer and the communication network. The security information comprises security measures which, when implemented by a network security module, protect the corresponding computer from an identified security threat to the computer.
摘要:
Described is a method and system for power management of mobile computer displays, in which areas of the screen are selectively controlled to consume less power than other areas. For example, a foreground window having focus may receive normal brightness, while background areas are dimmed. To this end, the pixels of selected areas are controlled to vary color depth, resolution, refresh rate, brightness and/or the on/off state for any part of the display. Power settings for parts of the display not corresponding to a focused window can be gradually reduced over time. Power policy may determine which areas are given reduced power, and external mechanisms provide information useful in the determination, such as when the user last interacted with a window, where the mouse is hovering, explicit user instructions as to how to power manage a window, and sensors that detect where the user is likely to want more power.
摘要:
Described is an architecture by which application programs can provide data to auxiliary display devices of essentially any type for display to a user. A defined application layer (e.g., accessed via interfaces) allows programs to provide data to a service that controls the output of data to an auxiliary display device, and returns navigational data to the application upon appropriate user interaction with the device via actuators. Enumeration allows applications to discover the capabilities of a device, while arbitration determines which application has input-output rights to the device. The architecture further provides a protocol layer including pluggable protocol proxies that allow various types of displays to serve as an auxiliary display. This platform-like model allows program developers the ability provide programs that leverage auxiliary displays when available, and provides display manufacturers the ability to provide displays with extensible capabilities.
摘要:
A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective to power consumption requirements. Processes that are not computationally intensive are processed by a low-power, auxiliary processor. In addition, peripheral components accessible to the overall computing system are shared.
摘要:
A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective to power consumption requirements. Processes that are not computationally intensive are processed by a low-power, auxiliary processor. In addition, peripheral components accessible to the overall computing system are shared.
摘要:
A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network.
摘要:
Described is a mechanism for receiving new data at an auxiliary device associated with a main computer system, and processing that new data within the auxiliary device firmware to take some action. The receipt and processing of the data is independent of whether the main computer system is in a powered-up state (online) or powered-down state (offline). A cache that maintains the user application data for offline navigation may be updated with new data, either to change existing data in the cache or add a new navigation path. The received data can be processed to perform other actions, depending on the context of that data as determined by auxiliary processing.
摘要:
The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
摘要:
A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network. The network security module also temporarily implements security patches until corresponding patches are installed onto the protected computer.