摘要:
A system and method for managing to-do list task items provides a user interface having user interface elements for allowing the user to add one or more task items to a to-do list, for allowing the user to edit one or more fields associated with a task item added to the to-do list, and for allowing the user to designate a task item within the to-do list as completed whereupon the designated task item is placed into a completed list and removed from the to-do list. Within the system, a task item is defined by at least a title, a description, a due date, and a tag. The tags provide a means for the task items to be organized within lists as well as within the system to, for example, allow task items to be shared, searched on, and the like.
摘要:
A system and method for managing to-do list task items provides a user interface having user interface elements for allowing the user to add one or more task items to a to-do list, for allowing the user to edit one or more fields associated with a task item added to the to-do list, and for allowing the user to designate a task item within the to-do list as completed whereupon the designated task item is placed into a completed list and removed from the to-do list. Within the system, a task item is defined by at least a title, a description, a due date, and a tag. The tags provide a means for the task items to be organized within lists as well as within the system to, for example, allow task items to be shared, searched on, and the like.
摘要:
The present invention relates amplifiers using metal oxide semiconductor based integrated circuits. The present invention is particularly but not exclusively related to audio application mixed signal chips. The present invention provides an analogue circuit for processing analogue signals in an integrated circuit comprising a number of metal oxide semiconductor transistor devices, the circuit stage comprising a first said transistor device having a first oxide thickness, and a second said transistor device having a second and different oxide thickness. Preferably a cascode based op amp structure is implemented.
摘要:
Slots or apertures are formed in the connector shroud of a T/R module in a plane perpendicular to the axis of the connector so as to allow plating solution to flow freely through the entire inner portion of the connector, particularly the rear portion, during fabrication of the T/R module. The slots are formed prior to the shroud being brazed on to the module substrate. By allowing plating solution to flow through the connector, the interior of the connector can be more thoroughly plated, thereby improving the yield of the assembly while reducing cost.
摘要:
An amplifier is disclosed, having an input stage connected to an output stage. The input stage is connected between a positive supply rail and a ground rail and has an input terminal arranged to receive an input signal. The output stage is connected between a positive supply rail and a negative supply rail and has an output terminal. The output stage is adapted to generate an output signal, which is dependent on a received input signal, at the output, and is further adapted such that, in use, a quiescent voltage at the output terminal is at a selected value between a voltage on the positive supply rail and a voltage on the negative supply rail. For driving a grounded load, the quiescent output voltage is preferably zero volts. In preferred embodiments, the input and output stages are formed on a common substrate using CMOS technology, the output stage including one or more NMOS devices having a triple-well structure. A corresponding method of driving a grounded load is also disclosed.
摘要:
In an exemplary embodiment, the server receives the client's Distinguishing Name (DN), and then searches its directory for identification information and access control rights for this specific context. The server can act as a stand-alone server or in conjunction with other directory services on the network. A client must have a verifiable identity in order for secure communications to continue. A client's identity can be said to be fully verifiable if the server has access to the directory service that maintains that client's DN. The client receives the server's DN, and the client can then determine whether or not to accept a response to a request for information (i.e., trust the response). The client determines the identity of the server using some directory service (the client can act stand-alone or as a client of other directory servers). A server is fully verifiable if the client can identify the directory service that maintains the server's DN. In both cases, determining identity is predicated on being able to identify a directory service. Since servers and clients are issued identities (DN's) from some directory service before they participate in secure communications, they are able to at least identify their “home” directory service. Their “home” directory service communicates with other directory services, each “serving” their lists of electronic identities to each other using secure directory services. In this manner, a client or server can verify the peer identity of a secure communicator by relying on the trusted “home” directory service. Public Key certificates, certificate revocation lists, pending certificate requests, Certification Authority policy, and other information is stored in the directory server. Access to the directory server is through secure communications; this maintains the integrity and privacy of the information.
摘要:
In an exemplary embodiment, the server receives the client's Distinguishing Name (DN), and then searches its directory for identification information and access control rights for this specific context. The server can act as a stand-alone server or in conjunction with other directory services on the network. A client must have a verifiable identity in order for secure communications to continue. A client's identity can be said to be fully verifiable if the server has access to the directory service that maintains that client's DN. The client receives the server's DN, and the client can then determine whether or not to accept a response to a request for information (i.e., trust the response). The client determines the identity of the server using some directory service (the client can act stand-alone or as a client of other directory servers). A server is fully verifiable if the client can identify the directory service that maintains the server's DN. In both cases, determining identity is predicated on being able to identify a directory service. Since servers and clients are issued identities (DN's) from some directory service before they participate in secure communications, they are able to at least identify their "home" directory service. Their "home" directory service communicates with other directory services, each "serving" their lists of electronic identities to each other using secure directory services. In this manner, a client or server can verify the peer identity of a secure communicator by relying on the trusted "home" directory service. Public Key certificates, certificate revocation lists, pending certificate requests, Certification Authority policy, and other information is stored in the directory server. Access to the directory server is through secure communications; this maintains the integrity and privacy of the information.