摘要:
Examples disclose determining an amount of memory for execution of an application, associated with a user preference, based on an inspection of data associated with the application. Further the example discloses transmitting a request to a non-volatile memory to allocate a segment corresponding to the amount of memory for execution of the application. Additionally, the example also discloses receiving a response of the amount of memory available for the segment and reserving a portion of the segment for the execution of the application.
摘要:
Embodiments herein relate to segmenting and pinning a first non-volatile memory to store cache information. In an embodiment, the first non-volatile memory is divided into a plurality of segments. Then, a first type of software of a plurality of types of software is pinned to a first segment of the plurality of segments. The first pinned segment stores the cache information associated with the first type of software.
摘要:
In one embodiment, a computer system comprises one or more processors, a circuit board assembly having at least one SATA port, a general purpose input/output port proximate the SATA port, signal generating logic to generate a signal when the general purpose input/output port is coupled to a connector, and a memory module communicatively connected to the one or more processors and comprising logic instructions stored in a computer readable medium which, when executed on the one or more processors, configure the one or more processors to configure the SATA port according to the signal generated by the signal generating circuitry.
摘要:
In one embodiment, a computer system comprises one or more processors, a circuit board assembly having at least one SATA port, a general purpose input/output port proximate the SATA port, signal generating logic to generate a signal when the general purpose input/output port is coupled to a connector, and a memory module communicatively connected to the one or more processors and comprising logic instructions stored in a computer readable medium which, when executed on the one or more processors, configure the one or more processors to configure the SATA port according to the signal generated by the signal generating circuitry.
摘要:
A computer system provides a unified password prompt for accepting a user power-on password or an administrator password. A password string entered by the system administrator at the unified password prompt is compared with a stored power-on password. If the user password string matches the stored power-on password, then access to system resources is granted. If the user password string does not match the stored power-on password, then the user password string is compared to a stored administrator password. If the user password string matches the stored administrative password, then access to system resources is granted. If the user password string does not match the stored administrative password, then the system administrator is given a predetermined number of times to enter a password string matching either the stored power-on password or the stored administrator password. If a password string matching either the stored power-on password or the stored administrator password is not provided in the predetermined number of times, access to system resources is denied. The unified password prompt does not require a system administrator to know a user's power-on password in order to access system resources. The unified password prompt also permits a system administrator to configure a plurality of computer systems by providing a single administrative password rather than a plurality of user power-on passwords.
摘要:
Example embodiments relate to use of a virtual machine image for sharing Internet access available to a mobile computing device. In example embodiments, a virtual machine image maintained on a storage device of a mobile computing device is received in a client computing device. A guest operating system (OS) contained in the virtual machine image may then be executed on the client computing device. Network data may then be exchanged between the guest OS and the mobile computing device over an interface between the client computing device and the mobile computing device.
摘要:
Systems and methods of accelerating delivery of remote content are disclosed. An example method includes monitoring usage of a client for content at a remote source over time to predict client access to content. The method also includes prefetching related content from the remote source based on the usage by the client. The method also includes delivering the prefetched related content to the client if the client requests access to corresponding content at the remote source.
摘要:
A computing device (101, 400, 500) has a processor (401) and at least one peripheral device port (106, 107, 108, 109, 410-1 to 410-5). The processor (401) is configured to selectively power the at least one peripheral device port (106, 107, 108, 109, 410-1 to 410-5) when the processor (401) is in a sleep state (302, 303, 304, 305, 306) according to at least one setting stored by firmware (405) of the processor (401).
摘要:
Example embodiments relate to use of a virtual machine image for sharing Internet access available to a mobile computing device. In example embodiments, a virtual machine image maintained on a storage device of a mobile computing device is received in a client computing device. A guest operating system (OS) contained in the virtual machine image may then be executed on the client computing device. Network data may then be exchanged between the guest OS and the mobile computing device over an interface between the client computing device and the mobile computing device.
摘要:
Systems and methods of accelerating delivery of remote content are disclosed. An example method includes monitoring usage of a client for content at a remote source over time to predict client access to content. The method also includes prefetching related content from the remote source based on the usage by the client. The method also includes delivering the prefetched related content to the client if the client requests access to corresponding content at the remote source.