摘要:
Various technologies and techniques are disclosed for creating and using phonetic schemes. A phonetic scheme creation feature is provided to allow a user to create a phonetic scheme that has one or more available phonetic character combinations in a source language and a resulting one or more native characters in a destination language for each of the phonetic character combinations. A phonetic input application is provided that can read the phonetic scheme to translate a respective character combination that is input by the user in the source language into the corresponding resulting native characters in the destination language. The phonetic scheme can be stored in a format that can be transferred to another computer. A dynamic help file can be created to document the phonetic scheme created by the user.
摘要:
Creating and using phonetic schemes is described. A phonetic scheme creation feature is provided to allow a user to create a phonetic scheme that has one or more available phonetic character combinations in a source language and a resulting one or more native characters in a destination language for each of the phonetic character combinations. A phonetic input application is provided that can read the phonetic scheme to translate a respective character combination that is input by the user in the source language into the corresponding resulting native characters in the destination language. The phonetic scheme can be stored in a format that can be transferred to another computer. A dynamic help file can be created to document the phonetic scheme created by the user.
摘要:
Various technologies and techniques are disclosed for providing suggestion lists for phonetic input. The system receives user input in a source language from an input device. The input is a partial phonetic representation in the source language of a character desired by a user in a destination language. Based on the user's input, a suggestion list is generated that includes a set of key/character combinations that can be pressed/entered on an input device in the source language to achieve at least one resulting character in the destination language. The suggestion list is dynamically generated based upon a prior usage history of the user. The suggestion list is displayed to the user on a display. The user can customize various suggestion list display settings. Upon generating the suggestion list, the display settings are retrieved, and the suggestion list is formatted according to the display settings.
摘要:
A portable rewritable medium and a method are provided for preventing unauthorized use of executable software stored on the portable rewritable medium. A portion of the software stored on the portable rewritable medium may include instructions for a processing device to determine whether execution of the executable software is permitted. If execution of the executable software is permitted, the processing device may execute the executable software directly from the portable rewritable medium. Characteristics of the portable rewritable medium may be checked to determine whether functionality of the executable software is to be limited.
摘要:
A portable rewritable medium and a method are provided for preventing unauthorized use of executable software stored on the portable rewritable medium. A portion of the software stored on the portable rewritable medium may include instructions for a processing device to determine whether execution of the executable software is permitted. If execution of the executable software is permitted, the processing device may execute the executable software directly from the portable rewritable medium. Characteristics of the portable rewritable medium may be checked to determine whether functionality of the executable software is to be limited.
摘要:
Multi-user multi-input desktop workspaces and applications are described. In one aspect, a single computing device presents multiple workspaces on a desktop area. The desktop area is designed for multiple users to provide in parallel inputs. Each workspace is configured for use by a particular set of users. Responsive to user direction, user access restrictions to a particular workspace of the multiple workspaces is suspended to allow a new user to interface within context of a particular workspace.
摘要:
Multi-user multi-input desktop workspaces and applications are described. In one aspect, a single computing device presents multiple workspaces on a desktop area. The desktop area is designed for multiple users to provide in parallel inputs. Each workspace is configured for use by a particular set of users. Responsive to user direction, user access restrictions to a particular workspace of the multiple workspaces is suspended to allow a new user to interface within context of a particular workspace.
摘要:
A search engine that resides on a local computer to enable query intent analysis, results ranking, and relevance processing over data of both local and remote data sources. The architecture also employs a global access component, which is a unified interface to disparate data discovery paradigms. The global access component provides access to corresponding disparate datasets of the paradigms for creating aggregation of information. A local search engine creates the aggregations of information from the disparate datasets via the global access component and processes a query against the aggregations of information to return search results.
摘要:
A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed.
摘要:
An inter-network remote control system is described that enables remote control of computing devices via two or more disparate data communications networks. In various embodiments, the inter-network remote control system receives a message from a mobile device via a first network, transforms the received message so that it can be relayed via a second network, and forwards the transformed message via the second network to a target computing device to cause that device to be controlled remotely.