摘要:
Systems, methods and products directed toward coordinating power states in a hybrid information handling device are described herein. One aspect includes a method including: providing a primary operating environment and a secondary operating environment in an information handling device; ascertaining a trigger event for switching between the primary operating environment and the secondary operating environment; providing power state transitioning responsive to the trigger event; and placing one of the primary operating environment and the secondary operating environment in a working state while one of the primary operating environment and the secondary operating environment is in a sleeping state. Other embodiments are described herein.
摘要:
Systems, methods and products directed toward coordinating power states in a hybrid information handling device are described herein. One aspect includes a method including: providing a primary operating environment and a secondary operating environment in an information handling device; ascertaining a trigger event for switching between the primary operating environment and the secondary operating environment; providing power state transitioning responsive to the trigger event; and placing one of the primary operating environment and the secondary operating environment in a working state while one of the primary operating environment and the secondary operating environment is in a sleeping state. Other embodiments are described herein.
摘要:
Power usage of computing device components is controlled in a holistic manner. The projected total power consumption for the computing device to satisfy a power consumption policy for the device is determined. Power usage of each component of the computing device is controlled in a holistic manner—i.e., balancing the power usage of the component against the power usage of other components—so that the total power usage of the computing device falls within the projected total power consumption needed to satisfy the power consumption policy. How the user is currently utilizing the computing device may be periodically detected, based at least on a power consumption distribution of the components of the computing device. A current usage model is determined based on how the user is currently utilizing the computing device. The power usage of each component of the computing device is controlled based on the current usage model.
摘要:
A method and apparatus is provided for switching between a primary computing environment and a secondary computing environment without changing the layout of a graphical user interface and a background display of the apparatus. A switching system switches operation between the primary computing environment and the secondary computing environment, switches a screen item between the primary computing environment and the secondary computing environment, and permits one of the primary and the secondary computing environments to go into a sleep state.
摘要:
Power usage of computing device components is controlled in a holistic manner. The projected total power consumption for the computing device to satisfy a power consumption policy for the device is determined. Power usage of each component of the computing device is controlled in a holistic manner—i.e., balancing the power usage of the component against the power usage of other components—so that the total power usage of the computing device falls within the projected total power consumption needed to satisfy the power consumption policy. How the user is currently utilizing the computing device may be periodically detected, based at least on a power consumption distribution of the components of the computing device. A current usage model is determined based on how the user is currently utilizing the computing device. The power usage of each component of the computing device is controlled based on the current usage model.
摘要:
The invention provides a method for a portable electronic device such as a computer to be capable of safely coping with the occurrence of a surprise removal from an external hard disk drive (HDD) connected by wireless. An HDD is connected to a portable computer by wireless via a wireless extension device. First, a wireless communication path between the HDD and the portable computer is configured. Subsequently, a file is read and edited by accessing the HDD from the portable computer. Next, removal information indicating that the portable computer is away from the HDD is produced. The removal information can be produced by detecting an acceleration generated in the portable computer, or by directly detecting the distance by the strength of the wireless signal. Data under editing is saved before occurrence of surprise removal by ejecting the HDD in response to the production of the removal information.
摘要:
Methods and apparatus are provided for securely inputting highly confidential information, exchanging the information via a network, and securely reflecting the information in a computer, without the information being stolen by malicious software. Upon a transfer of encrypted information from a server to a computer, the transferred information is stored in a memory of the computer and the computer is switched to a suspended state and immediately thereafter returns to the previous state to be shifted to under the control of a BIOS. The information stored in the memory is decrypted and processed there. Processing information generated based on the processed information is then encrypted and it is transferred to the server after the computer is switched to under the control of the operating system.
摘要:
A method for updating an ISO file, e.g., to add a digital signature to the ISO file, includes adding a supplemental file composed of, e.g., all zeroes to the ISO file before recording, and then recording the ISO file with supplemental file to an optical disk using ISO format. A digital signature is computed after recording. The zeroes in the supplemental file are replaced by the values of the digital signature and the file is re-saved. Also, an ISO file that might have a common part and several unique parts, e.g., for respective languages, is deconstructed such that only a single copy of the common part is recorded to disk, avoiding multiple recordations of the same data.
摘要:
To obtain a communication driver performing data conversion between a equipment and a management unit even when different data formats are used in a manufacturing system, in which the equipment that is equipped with a device for controlling a machine based on an instruction from the management unit and the management unit having a management application program that manages the equipment are connected to the machine, the communication driver includes device drivers (51a, 51b) provided for each type of devices (22a, 22b) in the manufacturing system and controlling communications with the devices (22a, 22b), and equipment drivers (52A, 52B) provided for each type of machines (21A, 21B) in the manufacturing system and accessing the machines (21A, 21B) to be accessed by using the device drivers (51a, 51b) in accordance with an instruction from the management application program (31). The device drivers (51a, 51b) and the equipment drivers (52A, 52B) are hierarchized.
摘要:
Methods and apparatus are provided for securely inputting highly confidential information, exchanging the information via a network, and securely reflecting the information in a computer, without the information being stolen by malicious software. Upon a transfer of encrypted information from a server to a computer, the transferred information is stored in a memory of the computer and the computer is switched to a suspended state and immediately thereafter returns-to the previous state to be shifted to under the control of a BIOS. The information stored in the memory is decrypted and processed there. Processing information generated based on the processed information is then encrypted and it is transferred to the server after the computer is switched to under the control of the operating system.