摘要:
The claimed subject matter provides a system and/or method that detect watermarks incorporated within analog and/or digital signals associated with multimedia presentations. The disclosed system can include a component that receives analog and/or digital signals, ascertains the existence of a watermark associated with the received signals, and extracts metadata encapsulated within the watermark, wherein the metadata can both include information regarding the broadcast multimedia presentations as well as information unrelated to the broadcast multimedia. Extracted metadata or more particularly, attributes contained within the metadata can be utilized to establish online social networks based at least on the associated attributes.
摘要:
The claimed subject matter provides a system and/or method that detect watermarks incorporated within analog and/or digital signals associated with multimedia presentations. The disclosed system can include a component that receives analog and/or digital signals, ascertains the existence of a watermark associated with the received signals, and extracts metadata encapsulated within the watermark, wherein the metadata can both include information regarding the broadcast multimedia presentations as well as information unrelated to the broadcast multimedia. Extracted metadata or more particularly, attributes contained within the metadata can be utilized to establish online social networks based at least on the associated attributes.
摘要:
Systems and methods are provided for flexible scheduling and pricing of multicore computer chips. Multicore computer chips can be scheduled to operate correctly despite nonoperational components by adjusting scheduling. They may be sold at a price that accounts for an extent to which components are not operational, because additional operational components allow for higher performance.
摘要:
Systems and methods are provided for securing a multicore computer chip with a watchdog processor. In a system with a watchdog process and any number of other processors and components, the watchdog processor monitors bus communications between the second processor and at least one third component. The watchdog processor may be further independently coupled to at least one of the other components so that it can monitor internal operations of such component, thereby acquiring detailed information about the specific operations of at least one component in the system. The watchdog processor can enforce an interaction policy on bus communications between components, as well as enforce an independent security policy on the monitored components.
摘要:
Various technologies and techniques are disclosed that modify a computer system based on user presence detection. An input device detects whether a user is present and adjusts the operation of an application accordingly. For example, ports or services can be disabled to increase security, a logging operation can be increased, a port or service that was previously disabled can be enabled, at least one system feature based on a number of users present can be adjusted, etc. If the user is detected to be absent, for example, then the system can disable at least one system port or service that does not need to be enabled while the user is absent to increase the security state of the computer. An attack directory can be accessed to retrieve information about the most likely services to be attacked, and that information can be used to help determine what services to disable.
摘要:
Systems and methods are provided for securing a multicore computer chip with a watchdog processor. In a system with a watchdog process and any number of other processors and components, the watchdog processor monitors bus communications between the second processor and at least one third component. The watchdog processor may be further independently coupled to at least one of the other components so that it can monitor internal operations of such component, thereby acquiring detailed information about the specific operations of at least one component in the system. The watchdog processor can enforce an interaction policy on bus communications between components, as well as enforce an independent security policy on the monitored components.
摘要:
A dual-mode, dual-display shared resource computing (SRC) device is usable to stream SRC content from a host SRC device while in an on-line mode and maintain functionality with the content during an off-line mode. Such remote SRC devices can be used to maintain multiple user-specific caches and to back-up cached content for multi-device systems.
摘要:
Sharing and exchanging information in a Shared Resource Computing (SRC) environment are disclosed. Example systems include a shared resource computing server and a plurality of peripheral devices. The SRC server may include functionality configured to share and exchange information between the peripheral devices, including functionality to determine the physical position of the peripheral devices, functionality to associate avatars to the peripheral devices, and functionality to display the avatars within a representation of the environment. Alternate embodiments may also include functionality for user authentication and functionality for sending a document between peripheral devices.
摘要:
A dual-mode, dual-display shared resource computing (SRC) device is usable to stream SRC content from a host SRC device while in an on-line mode and maintain functionality with the content during an off-line mode. Such remote SRC devices can be used to maintain multiple user-specific caches and to back-up cached content for multi-device systems.
摘要:
A healthcare smart card management system stores a large amount of healthcare information to overcome shortcomings of separate and largely paper medical and insurance files. Embedded security technology supports partial or separated identity proofing as well as hardware time limited storage. Dynamic contextual privacy consent enhances user, healthcare provider, and insurer privacy and proprietary information to encourage and enable universal adoption. Data is structured in self-executing (“print to device”) for legacy systems as well as in rolled-access format and archival format to balance usage and data integrity purposes. A plurality of network interfaces are incorporated as well as financial transaction codes. Card integrity is enhanced by remote usage oversight, self-destruct monitoring (e.g., time, location, hacking, malfunction, etc.), and integral write-only audit logs. Levering excess storage capacity, a user can store related healthcare information such as exercise regimen, diet journal, emergency contact information, urgent medical conditions for first providers, etc.