摘要:
A portion of microcode for a processor is stored outside the processor. If needed for execution, the processor loads the microcode from outside the processor into a microcode storage inside the processor. The microcode is loaded in the form of a microcode patch which consists of the microcode as well as other optional metadata and configuration data. The processor stalls and saves all instruction state prior to loading the microcode. Thus, the processor does not need to store all of the microcode inside the processor. The size of the microcode storage on the processor may be reduced.
摘要:
Apparatus includes an imaging system with a user interface, and a hospital radiological information system (RIS) coupled to the imaging system such that the user interface allows for bi-directional data transfer between the imaging system and the RIS.
摘要:
A battery having an electrode assembly located in a housing that efficiently utilizes the space available in many implantable medical devices is disclosed. The battery housing provides a cover and a shallow case a preferably planar, major bottom portion, an open top to receive the cover opposing the bottom portion, and a plurality of sides being radiused at intersections with each other and with the bottom to allow for the close abutting of other components located within the implantable device while also providing for efficient location of the battery within an arcuate edge of the device. The cover and the shallow case being substantially hermetically sealed by a laser weld technique and an insulator member disposed within the case to provide a barrier to incident laser radiation so that during welding radiation does not impinge upon radiation sensitive component(s) disposed within the case.
摘要:
A method, apparatus and system for transparent and dynamic resource allocation in a virtualized environment is disclosed. An embodiment of the present invention enables a resource allocation module to dynamically evaluate resource requests from various clients and allocate the resources on a virtual host as available. The resource allocation module may additionally monitor resource usage and dynamically reallocate resources as appropriate.
摘要:
A device virtual machine (VM) is configured to emulate a hardware device. The device VM includes device emulation code used to emulate the hardware device.
摘要:
A process is introduced that determines contour requirements from many factors. Based on the contour requirements, the process either generates at least one content-derived signature contour from either many content identifiers or at least one content-derived signature contour, or generates at least one optimized content-derived signature contour from contour-related data and either at least one content-derived signature contour or a derivation from at least one content-derived signature contour.
摘要:
Methods and apparatus are provided for processing information items. Processing comprises one of context filtering, context prioritizing, or both context filtering and context prioritizing. In some embodiments the set of context items from which processing criteria are derived includes a user's calendar of appointments, schedule changes, exceptions, and the like.
摘要:
A digit-mounted, spring-assisted device for launching a projectile in response to a launching motion of a finger by a user. The digit-mounted device may comprise a securing means for securing a launcher to the digit of the user. The securing means may comprise a strap, loop, or cinch. The digit-mounted device may further comprise a launch guide extending outwardly from a base member. A projectile may be mounted onto or into the launch guide. A spring may be mounted on the digit-mounted device which is placed under tension when the user prepares to make a launching motion with the digit. The projectile is launched in response to the user making a launching motion with the digit, using the thumb as a tensioning means. The spring is released from tension upon making a launching motion with the digit, adding to the force given to the projectile upon launch. The projectile may take a wide variety of forms.
摘要:
A technique allows for protecting a PCI device controller from a PCI BDF masquerade attack from Ring-0 and Ring-3 malware. The technique may use Virtualization technologies to create guest virtual machines that can use a hypervisor to allocate ACPI information from ACPI tables to a secure VM and using extended page tables (EPT) and VT-d policies to protect the MMIO memory range during illegal runtime events.