摘要:
A computing device is described herein that automatically enters a data protection mode in response to determining that a certain number of persons are located proximate to the computing device, that an owner or authorized user is not located proximate to the computing device, or that a certain user gesture has or has not been recognized. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
摘要:
A computing device is described herein that automatically enters a data protection mode in response to determining that a certain number of persons are located proximate to the computing device, that an owner or authorized user is not located proximate to the computing device, or that a certain user gesture has or has not been recognized. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
摘要:
A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input and/or user input behaviors during a device boot-up state, a user login state, or a device shut-down state. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
摘要:
Various techniques for managing forwarding tables in computer networks are disclosed herein. In one embodiment, a method includes receiving an indication of a network condition in a computer network having a network node and determining a routing table key based on the received indication of the network condition in the computing network. The routing table key corresponds to a routing table for the network node that is pre-computed under the indicated network condition in the computer network. The method then includes transmitting the determined routing table key to the network node for routing data in the computer network.
摘要:
A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input and/or user input behaviors during a device boot-up state, a user login state, or a device shut-down state. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
摘要:
A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input and/or user input behaviors during a device boot-up state, a user login state, or a device shut-down state. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
摘要:
The present invention extends to methods, systems, and computer program products for managing data-driven services. Aspects of the invention include a platform for data services. The platform manages data and associated data models holistically together. The platform enables and integrates data-driven services through a service model. The platform transforms data into information and information into intelligence and exposes insights to services. The platform allows for data and service sharing across domains.
摘要:
A torque wrench apparatus comprises a top wrench, a bottom wrench, and a middle wrench. The top and bottom wrenches are configured such that either one of them rotates a first joint in a first direction, and the middle wrench is configured to rotate a second joint in a second direction opposite the first direction; or the top and bottom wrenches are configured such that either one of them immobilizes a first joint, and the middle wrench is configured to rotate a second joint in a first direction; or the middle wrench is configured to immobilize a first joint, and the top and bottom wrenches are configured such that either one of them rotates a second joint in a second direction opposite the first direction. A method for making and breaking joints with the apparatus is also introduced.
摘要:
A voice activation system is provided. The voice activation system includes a first stage configured to output a first activation signal if at least one energy characteristic of a received audio signal satisfies at least one threshold and a second stage configured to transition from a first state to a second state in response to the first activation signal and, when in the second state, to output a second activation signal if at least a portion of a profile of the audio signal substantially matches at least one predetermined profile.