摘要:
A transmitter comprises a baseband processor, a wideband phase modulator and an amplitude modulated amplifier. A signal is provided through the baseband processor and is converted into polar coordinates, comprised of amplitude and phase components, with the amplitude component being transmitted to the amplitude modulated amplifier. The amplitude modulated amplifier being comprised of independently controllable current sources, and with the phase component being transmitted to the wideband phase modulator, for modulation upon a carrier wave, and subsequent transmission to the amplitude modulated amplifier for amplification according to control imposed by the amplitude component upon the current sources.
摘要:
A transceiver and transmitter are shown. A baseband processor receives a signal for transmission. It converts the signal into amplitude and phase polar components. Each component is then processed—the phase component through a wideband phase modulator and the amplitude component through a wideband amplitude modulator, and the components are then recombined for further processing or transmission.
摘要:
A system, apparatus, method and article to emulate a filter using digital elements are described. The apparatus may include a digital-to-analog converter having an impulse response emulator, the impulse response emulator to receive multiple digital signals each having a predetermined waveform, and convert a sequence of bits from each digital signal to a predetermined analog waveform corresponding to the sequence of bits using a lookup table or digital filter. Other embodiments are described and claimed.
摘要:
An apparatus including an amplitude mapping circuit for converting at least a portion of an amplitude signal to a binary value and a plurality of amplifiers coupled to the amplitude mapping circuit, such that the binary value is transmitted to at least one of the plurality of amplifiers to specify a gain level of the amplifier. The apparatus may be used in a system where an input wave has been divided into amplitude and frequency components.
摘要:
Protection against security attacks involves monitoring network traffic for a computing device security attack and determining whether there is a security event, using one or more network based security tools. Next, it is determined whether an event pattern involving two or more security events meets a predetermined criteria. Upon determining that there is a security attack, corrective action is tailored, based on the type of the computing device, the operating system of the computing device, the type of security attack, and/or the available protection tools. A course of action is performed depending on whether an account of the computing device includes a security protection service. If there is a security protection service, a message is sent over a secure link to the computing device. This message includes the corrective action to cure the computing device from the security attack.
摘要:
Information is provided to a mobile device while reducing the number of traffic channels established over a predetermined time period. A pull client on a mobile device receives requests for information from applications on the mobile device. The pull client creates a timing list which includes the timing requirements for each application. Applications that have overlapping timing requirements are grouped together into the same timing group. Once the time for creating a traffic channel for one of the groups arrives, a traffic channel is created between the mobile device and a carrier gateway. Information for each respective application within the same timing group is obtained through the network using the same traffic channel. When the requested information is provided to all applications within the same timing group, the traffic channel is released after a predetermined time. The method is repeated for a next timing group entry.
摘要:
A system, apparatus, method and article to emulate a filter using digital elements are described. The apparatus may include a digital-to-analog converter having an impulse response emulator, the impulse response emulator to receive multiple digital signals each having a predetermined waveform, and convert a sequence of bits from each digital signal to a predetermined analog waveform corresponding to the sequence of bits using a lookup table or digital filter. Other embodiments are described and claimed.
摘要:
A system, apparatus, method and article to emulate a filter are described. The apparatus may include a digital-to-analog converter having an impulse response emulator, the impulse response emulator to receive multiple digital signals each having a predetermined waveform, and convert a sequence of bits from each digital signal to a predetermined analog waveform corresponding to the sequence of bits. Other embodiments are described and claimed.
摘要:
Information is provided to a mobile device while reducing the number of traffic channels established over a predetermined time period. A pull client on a mobile device receives requests for information from applications on the mobile device. The pull client creates a timing list which includes the timing requirements for each application. Applications that have overlapping timing requirements are grouped together into the same timing group. Once the time for creating a traffic channel for one of the groups arrives, a traffic channel is created between the mobile device and a carrier gateway. Information for each respective application within the same timing group is obtained through the network using the same traffic channel. When the requested information is provided to all applications within the same timing group, the traffic channel is released after a predetermined time. The method is repeated for a next timing group entry.
摘要:
Protection against security attacks involves monitoring network traffic for a computing device security attack and determining whether there is a security event, using one or more network based security tools. Next, it is determined whether an event pattern involving two or more security events meets a predetermined criteria. Upon determining that there is a security attack, corrective action is tailored, based on the type of the computing device, the operating system of the computing device, the type of security attack, and/or the available protection tools. A course of action is performed depending on whether an account of the computing device includes a security protection service. If there is a security protection service, a message is sent over a secure link to the computing device. This message includes the corrective action to cure the computing device from the security attack.