摘要:
An approach is provided that uses a foldable transformable display case that includes two panels. The two panels are attached using a hinge. Two components are attachable to at least one of the panels. One of the two components is an integrated display screen. Another component is a keyboard unit. At least one of the components can be removed from the panels.
摘要:
An approach is provided that uses a foldable transformable display case that includes two panels. The two panels are attached using a hinge. Two components are attachable to at least one of the panels. One of the two components is an integrated display screen. Another component is a keyboard unit. At least one of the components can be removed from the panels.
摘要:
An approach is provided that determines whether keyboard power connection points included in a wireless keyboard are connected to system power connection points in a computer system. Power is sent from the computer system to the wireless keyboard. The power is transmitted through the system power connection points to the keyboard power connection points. Keyboard components included in the wireless keyboard are also powered using the power sent from the computer system. If the keyboard power connection points are not connected to the system power connection points, the keyboard components are powered included in the wireless keyboard by using a keyboard battery that is included in the wireless keyboard. One of the keyboard components that receives power is a wireless interface that connects the wireless keyboard to the computer system.
摘要:
Systems and methods that provide for voice command devices that receive sound but do not transfer the voice data beyond the system unless certain voice-filtering criteria have been met are described herein. In addition, embodiments provide devices that support voice command operation while external voice data transmission is in mute operation mode. As such, devices according to embodiments may process voice data locally responsive to the voice data matching voice-filtering criteria. Furthermore, systems and methods are described herein involving voice command devices that capture sound and analyze it in real-time on a word-by-word basis and decide whether to handle the voice data locally, transmit it externally, or both.
摘要:
An apparatus and method are presented for a maximum speed criterion for a velocity gesture. The apparatus includes a processor, a memory, a determination module and a transmission module. The determination module determines, through a wireless communication infrastructure mode, an amount of wireless network activity. The transmission module sets a rate of data transmission in a peer to peer mode based on the amount of wireless network activity.
摘要:
An apparatus for distance-based network resource discovery includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a distance between an information handling device and a network resource capable of communication with the information handling device. The machine readable code also includes a policy module following a discovery policy according to the distance. The discovery policy is associated with discovery of the network resource.
摘要:
Arrangements for employing a system BIOS (basic input/output system) to handle email during a suspended state (such as an “S3” state as will be better understood herebelow). Preferably, the BIOS is employed to “jump” between two suspended images such that, e.g., two more powerful OS's can be employed to manage the mail function.
摘要:
An apparatus, system, and method are disclosed for computer system power management. A control module 602 is activated on a computer 200 in response to an event and enters 818 a standby state if the computer 200 is not already 814 in the standby state. A policy module 604 detects 904 a power source of a predetermined type connected to the computer 200 and dictates 908 one or more processors 302 of higher power consumption for a more abundant type of power source such as an AC adapter 314, or one or more processors 304 of lower power consumption for a less abundant type of power source such as a battery 318. A configuration module 606, activated by the control module 602, switches 1004 the computer 200 to one or more processors 302 and 304 of a predetermined power consumption as dictated and exits 1016 the standby state.
摘要:
Methods and arrangements for managing a flash drive, hard disk, or connection between the two, in a manner to ensure that sensitive data is not decrypted at any time when it would be vulnerable. Accordingly, in a first implementation, the data may preferably be encrypted as it first goes into a flash drive and decrypted when it comes out of the flash drive. In another implementation, the flash drive may be logically bound to the hard disk, so that they would both use the same encryption key. In yet another implementation, if a hard disk is moved to another system, then the flash drive may also preferably be simultaneously moved.
摘要:
The present invention adds a procedure to the operating system file subsystem of a processing system that significantly reduces the amount of time necessary to verify the validity of executable files. Each executable is extended with a file signature containing a header containing validation data. This header may be added to an existing ELF header, added as a new section, or placed in a file's extended attribute store. The header contains results of all previous validation checks that have been performed. The file signature is inserted, with a date stamp, into the file attributes. On execution, the system checks the previously-created file signature against a current file signature, instead of creating the file signature for every file during the execution process. Checks to ensure that the file signature is secure, and is valid and up to date, are also implemented. Only if the file signature is not valid and up-to-date does the execution program create a new file signature at the time of execution.