摘要:
A computing device including a first computer portion pivotally connected to a second computer portion by a hinge. The computing device further includes an element moveable between a first position, in which the hinge is free to rotate, and a second position, in which the hinge is substantially prevented from rotating. A lock selectively controls movement of the element between the first and second positions.
摘要:
An anti-theft system for portable computing devices, and more particularly, to a countermeasure system and method triggered by movement of a computing screen to prevent the theft of a computing device. The device comprises a base portion, a display portion hingedly attached to the base portion and a sensor configured to detect a motion of the display portion with respect to the base portion. The device further includes a system activated when the sensor detects a motion of the display portion outside a predetermined location.
摘要:
A computing device including a first computer portion pivotally connected to a second computer portion by a hinge. The computing device further includes an element moveable between a first position, in which the hinge is free to rotate, and a second position, in which the hinge is substantially prevented from rotating. A lock selectively controls movement of the element between the first and second positions.
摘要:
A computing device including a first computer portion pivotally connected to a second computer portion by a hinge. The computing device further includes an element moveable between a first position, in which the hinge is free to rotate, and a second position, in which the hinge is substantially prevented from rotating. A lock selectively controls movement of the element between the first and second positions.
摘要:
This application describes non-depleting chips and their use in a Resource Management Framework. In this methodology, chips do not deplete when spent, but rather represent a weighting that each party/business unit (BU) has to accomplish its IT processing needs over time. In this model, BUs are assigned a certain buying power that may be thought of as akin to chips on a roulette wheel. Such a model may be used with either scheduled auctions (i.e., discrete events), or they may be used via a spot market where no scheduled auctions are conducted (i.e., fluid events). In this concept, the chips are never depleted.
摘要:
This application describes an application of resource unit brokering algorithms, chip management methods for automated brokering, chip management methods for live brokering, and chip allocation methods to the brokering of performance characteristics of service level management within an enterprise. Typically, the performance characteristics are derived from known capacity values that are provided by configuration managers. Calculations are made on the capacity values and maximum quantities of the availability resource units are provided to resource brokers for spot or periodic sale and auction to one or more buyer's agents.
摘要:
Systems, methods, media, and apparatuses for disabling camera functionality in a portable device are disclosed. Embodiments of the method may include establishing a connection with a camera-enabled portable device and transmitting to the portable device a request for permission to disable camera functionality. Embodiments of the method may also include receiving a response from the portable device relating to permission to disable camera functionality. Further embodiments of the method may include, in response to receiving permission to disable camera functionality, transmitting to the portable device a command to disable camera functionality or, in response to receiving an indication that the user refused permission, displaying a notification message. The command to disable camera functionality may include a command to disable camera functionality for a prescribed period, while the portable device is located within a secure geographical location, partially or fully disable camera functionality, and/or other methodology.
摘要:
An RFID Probe comprises a pole with a plurality of sensors that indicate RF signal strength attached at regular intervals and marked to indicate distance from an end of the pole. A user employs the RFID Probe by placing the probe between densely packed materials, such as cases on a pallet, and exposing the RFID Probe and packaging to a signal from a RIFD transceiver. After exposing the RFID Probe to the RFID transceiver signal, the user removes the RFID Probe from the packed materials and observes the sensors on the probe. By noting the location on the probe of the sensors indicating low or no RF signal, the user can identify locations where RF signal strength is insufficient to activate an RFID tag.
摘要:
A method of and system for filtering telephone calls receives a call to a called party from a caller and determines if the called party has an event scheduled. If the called party has an event scheduled, the system determines if the caller is associated with the event. The system completes the call if the caller is associated with the event. The system sends the call to voice mail if the caller is not associated with said event unless the caller is on an exception list associated with the event, in which case the system completes the call. The system completes the call if it is determined that said called party does not have an event scheduled.
摘要:
Disclosed are a method of and system for capturing and updating travel directions in a user's local address book application. The method comprises the steps of determining a current location profile of the user, calculating a user trajectory using that profile and an intended destination, and adding the current location profile and the intended destination into a historical database. The user's local address book is checked for an entry for the address of said intended destination; and if that entry is not in the address book, the entry is created in the address book. That entry is then checked to determine if a direction/map field of the entry contains directions/map information. If the entry does not contain this information, then this information is mined from a network source and added to the address book. This direction/map information is then displayed.