摘要:
An interpolation system generates an interpolated value in response to an input value. The interpolation system includes a function value store comprising a plurality of function value storage tables for storing function values for alternating domain coordinate values in a domain. An address generator, in response to an input value, generates address signals identifying locations in the function value storage tables to enable the function value storage tables to transmit function values in parallel. An interpolator receives function values transmitted in parallel by the function value storage tables and the input value and generating in response thereto the interpolated value.
摘要:
A computer information database system manages computer profile data for a set of computers. A profile group managing server coupled to the database manages the database such that there is a multiple node tree structure of groups for the set of computers in which each node is a group level and a top level is a root, based upon primary grouping criteria that correspond to selected computer profile data. Included in a database mapping table are fields that correspond to ranges of values for computer profile data of interest corresponding to primary grouping criteria including ranges that extend between a selected high and a selected low value. The ranges for any or all of the grouping criteria may be altered. The data in the database can be manipulated to produce summaries and reports of attributes of the computers in a given group.
摘要:
A system for assisting a customer during shopping includes machine-readable currently-owned item indicia store and a compatibility determination subsystem. The machine-readable currently-owned item indicia store includes a smart-card, magnetic disk or the like, for storing indicia identifying selected characteristics of items which are currently owned by the customer, including such information as, for example, accurate color andr styling parameter and metric information. The compatibility determination subsystem generates a compatibility assessment in response to the currently-owned item indicia stored by the currently-owned item indicia store, indicia identifying selected characteristics for items provisionally selected by the customer, and compatibility parameter information identifying compatibilities among various types of indicia.
摘要:
A method of obtaining information about usage of application executable files and associated software program in a network of computers or on an individual computer is provided. The method involves collecting information about last use of software programs, and associated executable files, on a computer or a set of managed computers from various resources on the computers. The information that is collected includes file name, directory, date and time the executable was last started, a security identifier of the last user, the method of last use, whether the executable was found to be running at the time it was found, and whether the executable is registered to run as a service. From this information, a list is generated regarding software items, and the list is merged such that a given executable has a single software item on the list. Reports are produced detailing information about one or more software items on the list. The reports may be displayed in a graphic user interface designed for that purpose.
摘要:
A security control verification and monitoring subsystem of a managed computer system performs security control verification operations regularly and for each security control verification operation determines the applicable security benchmark level for use by a given computer. The subsystem assigns security risk categories to groups of computers based, for example, on overall system or group administrator supplied potential impact settings and/or system type and business or information type selections. The subsystem further associates the security risk categories with security benchmark levels based on mapping information supplied by the overall system or group administrator. The subsystem then directs the computer to benchmark definition files based on the assigned security risk category, the associated security benchmark level and attributes of the computer. The subsystem performs the security control verification operations whenever the computer performs computer profile data update operations, and thus, monitors essentially continuously the security control compliance of the computer. The subsystem stores the results of the security verification operations and includes the results in reports for the system, group or computer.
摘要:
A computer information database system manages computer profile data grouping the plurality of computers in groups that are nodes of a tree in accordance with user-specified grouping criteria that are respective values of computer profile data of interest, and manipulating the database data to produce summaries of attributes of the computers in a given group and in the groups in the subtree that has the given group as its root. The grouping criteria may be ranges of values for primary grouping criteria, particular values for primary and secondary grouping criteria, ranges of values for both primary and secondary grouping criteria, and so forth. The system uses a group mapping database table that includes profile value-to-match fields for the primary grouping criteria and, as appropriate, the secondary grouping criteria. To use ranges of values, the group mapping database table includes for each range an associated low limit profile value field and a high limit profile value field. If particular values are used as either or both of the primary and secondary criteria, the corresponding low and high limits may be set to the same values or respective value to match fields may be used instead of the high and low limit fields. If there are no secondary grouping criteria associated with a particular primary grouping range, the corresponding entries for the secondary low and high limit profile values or, as appropriate, the entry for the corresponding value to match field is/are set to NULL. Additional grouping criteria may also be used to further refine the selection of computers for the groups, with additional fields for associated values-to-match or ranges included in the group mapping database table. The values or ranges for any or all of the grouping criteria may be altered and/or the values or ranges for grouping criteria may be added to records in which the corresponding fields were set to NULL to change the way in which the computers are grouped.
摘要:
A Computer Information Database System includes a software update and patch audit subsystem that manages computer profile data using system grouping and audit specification criteria. The subsystem thus selects a particular group of computers using the grouping criteria, and further selects from within the group the computers that pass or fail the applicable audit requirements. A given computer passes the requirements if the computer has installed thereon the specified software updates and patches that are applicable to the computer operating system platform. Otherwise, the computer fails. The audit subsystem may instead select particular computers using the audit specification criteria and then using the grouping criteria further select the subset of these computers that belong to a particular group. Further, the audit specification criteria may be set differently for the respective groups. Also, the grouping criteria and/or the security audit criteria may change without adversely impacting the operations of the subsystem. The audit system uses database tables and views that include value-to-match fields for either or both of the grouping and the audit specification criteria, and also software update or patch specific information and/or operating system specific information. One table includes group and operating system information for the respective computers, another table includes entries for the respective updates and patches that are installed on the respective computers, and another table includes entries that together specify the security audit specifications for the respective groups. Using the tables, the system produces views that relate, for example, to failing computers, what updates or patches the respective failing computers are missing, which or how many computers are failing within a particular group.
摘要:
A method for communicating a transform definition to a destination device. The transform definition outputs image parameter data based on input image data and has a channel corresponding to each output image parameter. Each channel has at least one input table, an output table and a grid table representing an input/output relation of an image transformation. The destination device is provided with: identification data identifying the communication as that of a transform definition; version data for distinguishing the transform definition from other versions of the transform definition; size data specifying a size of one of the grid table's dimensions for each channel's grid table; with input table, output table, and grid table data of any input, output, and grid table which is shared by a plurality of channels; and with input table, output table and grid table data of any private input, output, and grid tables.
摘要:
A computer information database system manages computer profile data for a set of computers. A profile group managing server coupled to the database manages the database such that there is a multiple node tree structure of groups for the set of computers in which each node is a group level and a top level is a root, based upon primary grouping criteria that correspond to selected computer profile data. Included in a database mapping table are fields that correspond to ranges of values for computer profile data of interest corresponding to primary grouping criteria including ranges that extend between a selected high and a selected low value. The ranges for any or all of the grouping criteria may be altered. The data in the database can be manipulated to produce summaries and reports of attributes of the computers in a given group.
摘要:
A network includes one or more client computers which can retrieve Web pages and supplemental content items, such as advertisements, from one or more server computers, for display or other processing. Each Web page can have fixed content, one or more fixed URL's identifying supplemental content items to be, for example, displayed at particular locations on the Web page, and one or more sets of conditional items, with each conditional item set comprising content item(s) or content item identifier(s), such as URL's, and personal selection criteria to be used in selecting one of the content item(s) or identifier(s) to be, for example, displayed at a respective location on the Web page. When a client computer receives a Web page from a server computer, it (that is, the client computer) will, for example, display the fixed Web page content and, obtain supplemental content items identified by the fixed URL's to be displayed along with the fixed content. In addition, the client computer will process each set of conditional items in conjunction with personal information maintained by the client computer and selection criteria for the set to identify one of the conditional content item(s) to be displayed, or one of the conditional item identifier(s) to be used in obtaining a supplemental content item to be displayed along with the Web page. Since the client computer determines the particular conditional content or content identifier based on selection criteria provided with the Web page, and personal information maintained by the client computer itself, the personal information need not be provided to or otherwise obtained by the server computer to allow for personalization of the Web page.